repo
stringlengths
7
90
file_url
stringlengths
81
315
file_path
stringlengths
4
228
content
stringlengths
0
32.8k
language
stringclasses
1 value
license
stringclasses
7 values
commit_sha
stringlengths
40
40
retrieved_at
stringdate
2026-01-04 14:38:15
2026-01-05 02:33:18
truncated
bool
2 classes
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/CSAW/2022/Quals/crypto/Beyond_Quantum/server.py
ctfs/CSAW/2022/Quals/crypto/Beyond_Quantum/server.py
import numpy as np import sys from cipher.cipher import Cipher from cipher.mathutils import random_poly from sympy.abc import x from sympy import ZZ, Poly import math def encrypt_command(data, public_key): input_arr = np.unpackbits(np.frombuffer(data, dtype=np.uint8)) input_arr = np.trim_zeros(input_arr, 'b') output = encrypt(public_key, input_arr, bin_output=True) output = np.packbits(np.array(output).astype(int)).tobytes().hex() return output def poly_to_bytes(poly): res = poly.set_domain(ZZ).all_coeffs()[::-1] res = np.packbits(np.array(res).astype(int)).tobytes().hex() return bytes.fromhex(res) def decrypt_command(data, private_key): input_arr = np.unpackbits(np.frombuffer(data, dtype=np.uint8)) input_arr = np.trim_zeros(input_arr, 'b') output = decrypt(private_key, input_arr, bin_input=True) output = np.packbits(np.array(output).astype(int)).tobytes().hex() output = bytes.fromhex(output) return output def generate(N, p, q): cipher = Cipher(N, p, q) cipher.generate_random_keys() h = np.array(cipher.h_poly.all_coeffs()[::-1]) f, f_p = np.array(cipher.f_poly.all_coeffs()[::-1]), np.array(cipher.f_p_poly.all_coeffs()[::-1]) private_key = {'N': N, 'p': p, 'q': q, 'f': f, 'f_p': f_p} public_key = {'N': N, 'p': p, 'q': q, 'h': h} return (private_key, public_key) def encrypt(pub_key, input_arr, bin_output=False): global h_poly global c_poly cipher = Cipher(int(pub_key['N']), int(pub_key['p']), int(pub_key['q'])) cipher.h_poly = Poly(pub_key['h'].astype(int)[::-1], x).set_domain(ZZ) h_poly = cipher.h_poly if cipher.N < len(input_arr): raise Exception("Input is too large for current N") c_poly = cipher.encrypt(Poly(input_arr[::-1], x).set_domain(ZZ), random_poly(cipher.N, int(math.sqrt(cipher.q)))) output = c_poly.all_coeffs()[::-1] if bin_output: k = int(math.log2(cipher.q)) output = [[0 if c == '0' else 1 for c in np.binary_repr(n, width=k)] for n in output] return np.array(output).flatten() def decrypt(priv_key, input_arr, bin_input=False): cipher = Cipher(int(priv_key['N']), int(priv_key['p']), int(priv_key['q'])) cipher.f_poly = Poly(priv_key['f'].astype(int)[::-1], x).set_domain(ZZ) cipher.f_p_poly = Poly(priv_key['f_p'].astype(int)[::-1], x).set_domain(ZZ) if bin_input: k = int(math.log2(cipher.q)) pad = k - len(input_arr) % k if pad == k: pad = 0 input_arr = np.array([int("".join(n.astype(str)), 2) for n in np.pad(np.array(input_arr), (0, pad), 'constant').reshape((-1, k))]) if cipher.N < len(input_arr): raise Exception("Input is too large for current N") return cipher.decrypt(Poly(input_arr[::-1], x).set_domain(ZZ)).all_coeffs()[::-1] def get_password(): with open("password.txt") as file: password = "".join(file.readlines()).strip() return password def main(): password = get_password() print("********** B E Y O N D Q U A N T U M **********\n") print(" I heard that quantums are flying around these days and") print("people are thinking of attacking cryptosystems with them.") print("So I found this awesome cryptosystem that is safe from") print("quantums! You can send as many qubits as you like at this") print("cipher, and none of them will break it. Here is a proof of") print("concept to show the world how robust our cryptosystem is.") print("I\'ve encrypted a password and no amount of skullduggery") print("will help you to get it back. See, you can encrypt and") print("decrypt all you want, you won\'t get anywhere!") private_key, public_key = generate(N=97, p=3, q=128) print(" This is an asymmetric cryptosystem so here is the public") print("key:\n") print(str(public_key) + "\n") pwd_ct = encrypt_command(password.encode(), public_key) print(" The password ciphertext is " + pwd_ct + "\n") print(" Have at it!\n") while True: print("/------------------------------\\") print("| COMMANDS |") print("| |") print("| 1) ciphertext_as_poly |") print("| 2) publickey_as_poly |") print("| 3) solve_challenge <password> |") print("| 4) exit |") print("\\------------------------------/\n") print("> ", end="") sys.stdout.flush() parts = sys.stdin.readline()[:-1].split(" ") try: if parts[0] == "ciphertext_as_poly" or parts[0] == "1": print(c_poly) sys.stdout.flush() elif parts[0] == "publickey_as_poly" or parts[0] == "2": print(h_poly) sys.stdout.flush() elif parts[0] == "solve_challenge" or parts[0] == "3": candidate_password = parts[1] if candidate_password == password: print("\nWhat?! How did you do that??\n") with open("flag.txt") as file: print("".join(file.readlines())) else: print("\nNope!\n") elif parts[0] == "exit" or parts[0] == "4": print("\nBye!") sys.stdout.flush() return else: print("\nUnknown command.") raise Exception() except: print("\nSomething went wrong...") print("...try again?\n") sys.stdout.flush() if __name__ == "__main__": main()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/CSAW/2022/Quals/crypto/PoodleGiftShop/server.py
ctfs/CSAW/2022/Quals/crypto/PoodleGiftShop/server.py
#!/usr/bin/python3 import hashlib import hmac import sys from base64 import b64encode, b64decode from Crypto import Random from Crypto.Cipher import AES key = open('./key', 'r').read().strip().encode() flag = open('./flag.txt', 'r').readline().strip().encode() def get_hmac(m): return hmac.new(key, msg=m, digestmod=hashlib.sha256).digest() def hmac_is_valid(pt): digest = pt[-32:] msg = pt[:-32] return equal_bytearrays(hmac.new(key, msg=msg, digestmod=hashlib.sha256).digest(), digest) def equal_bytearrays(a1, a2): if len(a1) != len(a2): return False else: for i in range(len(a1)): if a1[i] != a2[i]: return False return True def pad(pt): pad_value = 16 - len(pt) % 16 pt = pt + (chr(pad_value) * pad_value).encode() return pt def verify_padding_and_unpad(pt): pad_value = pt[-1] if pad_value == 0 or pad_value > 32: return False else: pt = pt[:(-1 * pad_value)] return pad_value, pt def encrypt(pt): iv = Random.new().read(AES.block_size) cipher = AES.new(key, AES.MODE_CBC, iv) ct = cipher.encrypt(pt) ct = iv + ct ct = b64encode(ct) return ct def decrypt(ct): ct_incl_iv = b64decode(ct) iv, ct = ct_incl_iv[:16], ct_incl_iv[16:] cipher = AES.new(key, AES.MODE_CBC, iv) return cipher.decrypt(ct) def decrypt_and_verify(ct): pt = decrypt(ct) pad, pt = verify_padding_and_unpad(pt) if pt and hmac_is_valid(pt): print( "\nValid plaintext. We assume you have purchased our flag decryption key and can therefore read the flag. Thank you for your patronage.\n") return True print("Something went wrong during decryption. Try again?") return False def get_canine_order(): print("What type of canine would you like to purchase?") print("> ", end="") canine_type = input().encode() print("\nHow many would you like to purchase? (We have unlimited supplies...)") print("> ", end="") canine_quant = input().encode() return canine_type, canine_quant def process_encryption(): canine_type, canine_order = get_canine_order() msg = b"Congratulations, you just completed your " + canine_type + b" purchase instead of buying this beautiful flag: " + flag msg += b". What were you thinking? Fortunately you have helped " + canine_order + b" canines and puppies find homes" hmac = get_hmac(msg) pt = msg + hmac pt = pad(pt) ct = encrypt(pt) print() print(b"A plane flies overhead flying a banner that reads: " + ct, "\n") return ct def get_selection(): print("Enter your selection:") print(" 1) Enter the shop") print(" 2) Decrypt") print(" 3) Leave the shop\n") print("> ", end='') selection = input().strip() if selection in list('123'): print("") return selection else: print("Error: Invalid selection.") exit(0) def main(): print("********** C S A W G I F T S H O P **********\n") print(" Welcome to the CSAW Canine Gift Shop! ") print("Leaving city dwellers have asked us to find home for their MANY canine friends.") print("We have canines of all kinds ... as well as encrypted flags constantly flying ") print("overhead and a key to decrypt them that should be well within your price range.\n\n") while (1): selection = int(get_selection()) try: if selection == 1: process_encryption() sys.stdout.flush() elif selection == 2: print("Enter the base64-encoded ciphertext to decrypt: ") print("> ", end='') ct = input().encode() decrypt_and_verify(ct) sys.stdout.flush() elif selection == 3: print("Thank you for shopping with CSAW!") exit(0) else: print("Error: invalid menu option.") raise Exception except Exception as ex: print("\nSomething went wrong......try again?\n") sys.stdout.flush() if __name__ == "__main__": main()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/CSAW/2022/Quals/web/GoodIntentions/server/run.py
ctfs/CSAW/2022/Quals/web/GoodIntentions/server/run.py
from application.main import app from application.database import migrate_db with app.app_context(): migrate_db() app.run(host='0.0.0.0', port=1337, debug=False)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/CSAW/2022/Quals/web/GoodIntentions/server/application/util.py
ctfs/CSAW/2022/Quals/web/GoodIntentions/server/application/util.py
import os from flask import current_app, abort from flask_login import current_user import functools generate = lambda x: os.urandom(x).hex() def admin_only(f): @functools.wraps(f) def wrap(*args, **kwargs): if current_user.username == current_app.config['ADMIN_USERNAME']: return f(*args, **kwargs) else: return abort(401) return wrap
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/CSAW/2022/Quals/web/GoodIntentions/server/application/main.py
ctfs/CSAW/2022/Quals/web/GoodIntentions/server/application/main.py
from flask import Flask, current_app from flask_login import LoginManager from flask_session import Session import logging import logging.config from application.blueprints.routes import web, api, response from application.database import db, User app=Flask(__name__) app.config.from_object('application.config.Config') logging.config.fileConfig(f"/app/application/static/conf/default.conf") db.init_app(app) db.create_all(app=app) login_manager = LoginManager() login_manager.init_app(app) sess = Session() sess.init_app(app) app.register_blueprint(web, url_prefix='/') app.register_blueprint(api, url_prefix='/api') @login_manager.user_loader def load_user(user_id): return User.query.get(int(user_id)) @app.errorhandler(404) def not_found(error): return response('404 Not Found'), 404 @app.errorhandler(403) def forbidden(error): return response('403 Forbidden'), 403 @app.errorhandler(400) def bad_request(error): return response('400 Bad Request'), 400
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/CSAW/2022/Quals/web/GoodIntentions/server/application/database.py
ctfs/CSAW/2022/Quals/web/GoodIntentions/server/application/database.py
from flask_sqlalchemy import SQLAlchemy from flask_login import UserMixin from flask import current_app db = SQLAlchemy() class User(db.Model, UserMixin): id = db.Column(db.Integer, primary_key=True) username = db.Column(db.String(100), unique=True) password = db.Column(db.String(100)) class Image(db.Model, UserMixin): id = db.Column(db.Integer, primary_key=True) username = db.Column(db.String(100)) location = db.Column(db.String(100), unique=True) def clear_db(): meta = db.metadata for table in reversed(meta.sorted_tables): db.session.execute(table.delete()) db.session.commit() def migrate_db(): clear_db() # admin user db.session.add(User(id=1, username=current_app.config['ADMIN_USERNAME'], password=current_app.config['ADMIN_PASSWORD'])) db.session.commit()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/CSAW/2022/Quals/web/GoodIntentions/server/application/config.py
ctfs/CSAW/2022/Quals/web/GoodIntentions/server/application/config.py
from application.util import generate import os class Config(object): ADMIN_USERNAME = 'admin' ADMIN_PASSWORD = generate(15) UPLOAD_FOLDER = f'{os.getcwd()}/application/static' SECRET_KEY = generate(50) SESSION_PERMANENT = False SESSION_TYPE = 'filesystem' SESSION_KEY_PREFIX = '' SESSION_FILE_THRESHOLD = 20 SESSION_USE_SIGNER = False SQLALCHEMY_DATABASE_URI = 'sqlite:///database.db' SQLALCHEMY_TRACK_MODIFICATIONS = False
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/CSAW/2022/Quals/web/GoodIntentions/server/application/static/docs/api_client.py
ctfs/CSAW/2022/Quals/web/GoodIntentions/server/application/static/docs/api_client.py
# Sample API client for users who want to get started helping us collect and label space pictures! import requests import json api_url = "http://[IP]:[PORT]" username = "[USERNAME HERE]" password = "[PASSWORD HERE]" image_file = "[FILE NAME HERE]" label = "[LABEL HERE]" def register(username, password): url = api_url + "/api/register" payload = json.dumps({ "username": username, "password": password }) headers = { 'Content-Type': 'application/json' } response = requests.request("POST", url, headers=headers, data=payload) return response def login(username, password): url = api_url + "/api/login" payload = json.dumps({ "username": username, "password": password }) headers = { 'Content-Type': 'application/json' } connection = requests.Session() response = connection.request("POST", url, headers=headers, data=payload) return response,connection def upload(connection, filename, label): url = api_url + "/api/upload" with open(filename, "rb") as f: data = f.read() files = {'file': data} #Edit the label appropriately values = {'label': label} response = connection.request("POST", url, files=files, data=values) return response def main(): response = register(username, password) print(response.text) response, connection = login(username, password) print(response.text) response = upload(connection, image_file, label) print(response.text) if __name__ == "__main__": main()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/CSAW/2022/Quals/web/GoodIntentions/server/application/blueprints/routes.py
ctfs/CSAW/2022/Quals/web/GoodIntentions/server/application/blueprints/routes.py
import json from application.database import User, Image, db, migrate_db from application.util import admin_only, generate import sys, os from subprocess import PIPE, run from flask import Blueprint, jsonify, redirect, render_template, request, current_app, send_file from flask_login import current_user, login_required, login_user, logout_user from werkzeug.utils import secure_filename import logging import logging.config logger = logging.getLogger(__name__) web = Blueprint('web', __name__) api = Blueprint('api', __name__) """ Front-end of the site is currently in development but we've put placeholders for now... """ def response(message): return jsonify({'message': message}) @web.route('/', methods=['GET']) def landing_page(): return render_template('landing.html') #WORK IN PROGRESS """@web.route('/login', methods=['GET']) def login(): return render_template('login.html') """ @api.route('/login', methods=['POST']) def user_login(): current_app.logger.debug("Entering login") if not request.is_json: return response('Missing required parameters!'), 401 data = request.get_json() username = data.get('username', '') password = data.get('password', '') if not username or not password: return response('Missing required parameters!'), 401 user = User.query.filter_by(username=username).first() if not user or not user.password == password: return response('Invalid username or password!'), 403 login_user(user) return response('User authenticated successfully!') #WORK IN PROGRESS """@web.route('/register', methods=['GET']) def register(): return render_template('register.html') """ @api.route('/register', methods=['POST']) def user_registration(): current_app.logger.debug("Entering register") if not request.is_json: return response('Missing required parameters!'), 401 data = request.get_json() username = data.get('username', '') password = data.get('password', '') if not username or not password: return response('Missing required parameters!'), 401 user = User.query.filter_by(username=username).first() if user: return response('User already exists!'), 401 new_user = User(username=username, password=password) db.session.add(new_user) db.session.commit() return response('User registered successfully!') #return redirect('/') #WORK IN PROGRESS """@web.route('/logout') @login_required def logout(): logout_user() return redirect('/') """ @api.route('/gallery', methods=['GET']) @login_required def gallery(): current_app.logger.debug("Entering gallery") query = Image.query.filter_by(username=current_user.username).all() locations = [] for image in query: locations.append(image.location) return response(locations) @api.route('/download_image', methods=['GET']) @login_required def download_image(): current_app.logger.debug("Entering download image") if 'file' not in request.args: return response('Missing required parameters!'), 401 query = Image.query.filter_by(location=request.args["file"]).first() if query.location: return send_file(f"{current_app.config['UPLOAD_FOLDER']}/images/{query.location}") else: return response("File not found!") @api.route('/upload', methods=['POST']) @login_required def upload_image(): if 'file' not in request.files or 'label' not in request.form: return response('Missing required parameters!'), 401 file = request.files['file'] label=request.form["label"] if file.filename == '': return response('Missing required parameters!'), 401 rand_dir = generate(15) upload_dir = f"{current_app.config['UPLOAD_FOLDER']}/images/{rand_dir}/" os.makedirs(upload_dir, exist_ok=True) filename = secure_filename(str(label + "_" + generate(10))) file.save(upload_dir + filename) new_file = Image(username=current_user.username, location=f"{rand_dir}/{filename}") db.session.add(new_file) db.session.commit() return response("File successfully uploaded") #One of the volunteers keeps messing with the logger config. Doing this as a temporary fix so I can fix remotely... #If you're the one doing it and reading this, please stop. @api.route('/log_config', methods=['POST']) @login_required def log_config(): if not request.is_json: return response('Missing required parameters!'), 401 data = request.get_json() file_name = data.get('filename', '') logging.config.fileConfig(f"{current_app.config['UPLOAD_FOLDER']}/conf/{file_name}") return response(data) #WORK IN PROGRESS """@web.route('/admin') @login_required @admin_only def admin_panel(): pass """ # One of the guys cant get his VPN working on his laptop and complains he needs to do some checks remotely... @api.route('/run_command', methods=['POST']) @login_required @admin_only def remote_exec(): if not request.is_json: return response('Missing required parameters!') data = request.get_json() command = data.get('command','') result = run(command, stdout=PIPE, stderr=PIPE, shell=True) return response(result.stdout.decode())
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/CSAW/2020/Quals/slithery/sandbox.py
ctfs/CSAW/2020/Quals/slithery/sandbox.py
#!/usr/bin/env python3 from base64 import b64decode import blacklist # you don't get to see this :p """ Don't worry, if you break out of this one, we have another one underneath so that you won't wreak any havoc! """ def main(): print("EduPy 3.8.2") while True: try: command = input(">>> ") if any([x in command for x in blacklist.BLACKLIST]): raise Exception("not allowed!!") final_cmd = """ uOaoBPLLRN = open("sandbox.py", "r") uDwjTIgNRU = int(((54 * 8) / 16) * (1/3) - 8) ORppRjAVZL = uOaoBPLLRN.readlines()[uDwjTIgNRU].strip().split(" ") AAnBLJqtRv = ORppRjAVZL[uDwjTIgNRU] bAfGdqzzpg = ORppRjAVZL[-uDwjTIgNRU] uOaoBPLLRN.close() HrjYMvtxwA = getattr(__import__(AAnBLJqtRv), bAfGdqzzpg) RMbPOQHCzt = __builtins__.__dict__[HrjYMvtxwA(b'X19pbXBvcnRfXw==').decode('utf-8')](HrjYMvtxwA(b'bnVtcHk=').decode('utf-8'))\n""" + command exec(final_cmd) except (KeyboardInterrupt, EOFError): return 0 except Exception as e: print(f"Exception: {e}") if __name__ == "__main__": exit(main())
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/pwn/Blind_Shell/blind.py
ctfs/ImaginaryCTF/2021/pwn/Blind_Shell/blind.py
#!/usr/bin/env python3.8 from subprocess import run if __name__ == "__main__": while True: cmd = input(">>> ") proc = run([cmd], capture_output=True, shell=True, timeout=60) if proc.returncode == 0: print("SUCCESS") else: print("FAILURE")
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/pwn/ICICLE_Jail/pwn.py
ctfs/ImaginaryCTF/2021/pwn/ICICLE_Jail/pwn.py
#!/usr/bin/python3 -u from icicle import * if __name__ == '__main__': code = input("Enter a line of icicle code: ") blacklist = ["read", "write", "flag", "txt", "ictf"] for i in blacklist: if i in code: print("Don't hack me!") exit() vm = VM(program=code) vm.run()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/pwn/ICICLE_Jail/icicle.py
ctfs/ImaginaryCTF/2021/pwn/ICICLE_Jail/icicle.py
#!/usr/bin/env python3 import sys from Crypto.Util.number import * import time MEMSIZE = 2**16 REGNAMES = ["r%d"%i for i in range(16)]+['rip'] DEBUG = 0 def prd(*args): if DEBUG: print(*args) class MemoryException(Exception): pass class Memory(): def __init__(self, size=MEMSIZE, mem=None, rnames=REGNAMES): if mem is not None: self.size = mem.size self.regs = {k:mem.regs[k] for k in mem.regs} self.ram = {k:mem.ram[k] for k in mem.ram} self.regs['rip'] = 0 else: self.size = size self.regs = {r:0 for r in rnames} self.ram = {} def setRam(self, addr, val): if type(addr) != int: raise MemoryException("Attempting to access invalid memory address "+str(addr)) if addr < 0 or addr >= self.size: raise MemoryException("Memory "+str(addr)+" out of bounds!") self.ram[addr] = val def getRam(self, addr): if type(addr) != int: raise MemoryException("Attempting to access invalid memory address "+str(addr)) if addr < 0 or addr >= self.size: raise MemoryException("Memory "+str(addr)+" out of bounds!") if addr in self.ram: return self.ram[addr] self.ram[addr] = 0 return 0 def getVal(self, val): if type(val) != str or len(val) == 0: raise MemoryException("Bad value "+str(val)+" recieved!") if val.isdigit(): return int(val) if val in self.regs: return self.regs[val] if val[0] == '[' and val[-1] == ']': return self.getRam(self.getVal(val[1:-1])) if val[0] == '"' and val[-1] == '"': return val[1:-1] if val[0] == "'" and val[-1] == "'": return val[1:-1] raise MemoryException("Bad value "+str(val)+" recieved!") def assign(self, loc, val): if type(loc) != str or len(loc) == 0: raise MemoryException("Bad location "+str(loc)+" recieved!") if loc in self.regs: self.regs[loc] = val return if loc[0] == '[' and loc[-1] == ']': self.setRam(self.getVal(loc[1:-1]), val) def rip(self): return self.regs['rip'] def inc_rip(self): self.regs['rip'] += 1 class VM(): def __init__(self, program='', memory=None): self.program = self.parseStr(program) if memory is not None: self.mem = Memory(mem=memory) else: self.mem = Memory(size=MEMSIZE) self.insns_map = {"add": self.add, "sub": self.sub, "mult": self.mult, "div": self.div, "mod": self.mod, "xor": self.xor, "and": self.andd, "or": self.orr, "rev": self.rev, "mov": self.mov, "strint": self.strint, "intstr": self.intstr, "pr": self.pr, "readstr": self.readstr, "readint": self.readint, "j": self.jump, "jnz": self.jnz, "jz": self.jz, "jl": self.jl, "readf": self.readf, "writef": self.writef, "exec": self.exec, } # also labels def quit(self, msg='', exitcode=1, test=False): if exitcode != 0: print("Error running line '", self.c_insn(), "' at insn pointer", self.mem.rip()) if msg == '': print("Quitting...") else: print(msg) exit(exitcode) def parseStr(self, s): return [line.strip() for line in s.split('\n')] def parseInsn(self, insn): args = insn.split("#")[0].strip().split(" ") cmd = args[0] rest = " ".join(args[1:]).strip().split(", ") return [cmd]+rest def c_insn(self): return self.program[self.mem.rip()] def run(self): try: while self.mem.rip() < len(self.program): prd("Executing '"+self.c_insn()+"' at insn_pointer "+str(self.mem.rip())) self.execute_insn(self.c_insn()) self.mem.inc_rip() except MemoryException as e: self.quit(str(e)) except Exception as e: print("Unknown error occurred.") if DEBUG: raise e self.quit() def execute_insn(self, insn): if insn == '' or insn[-1] == ':' or insn[0] == "#": return args = self.parseInsn(insn) prd(args) self.insns_map[args[0]](*args[1:]) def setRam(self, addr, val): return self.mem.setRam(addr, val) def getRam(self, addr): return self.mem.getRam(addr) def getVal(self, val): return self.mem.getVal(val) def assign(self, loc, val): return self.mem.assign(loc, val) def reset(self): self.mem = Memory() def add(self, *args): a1 = self.getVal(args[1]) a2 = self.getVal(args[2]) if type(a1) != type(a2): a1 = str(a1) a2 = str(a2) self.assign(args[0], a1+a2) def sub(self, *args): a1 = self.getVal(args[1]) a2 = self.getVal(args[2]) if type(a1) != int or type(a2) != int: self.quit("sub args not int!") self.assign(args[0], a1-a2) def mult(self, *args): a1 = self.getVal(args[1]) a2 = self.getVal(args[2]) if type(a1) == str or type(a2) == str: self.quit("Both mult args are strings!") self.assign(args[0], a1*a2) def div(self, *args): a1 = self.getVal(args[1]) a2 = self.getVal(args[2]) if type(a1) != int or type(a2) != int: self.quit("div args not int!") self.assign(args[0], a1//a2) def mod(self, *args): a1 = self.getVal(args[1]) a2 = self.getVal(args[2]) if type(a1) != int or type(a2) != int: self.quit("mod args not int!") self.assign(args[0], a1%a2) def andd(self, *args): a1 = self.getVal(args[1]) a2 = self.getVal(args[2]) if type(a1) != int or type(a2) != int: self.quit("and args not int!") self.assign(args[0], a1&a2) def orr(self, *args): a1 = self.getVal(args[1]) a2 = self.getVal(args[2]) if type(a1) != int or type(a2) != int: self.quit("or args not int!") self.assign(args[0], a1|a2) def xor(self, *args): a1 = self.getVal(args[1]) a2 = self.getVal(args[2]) if type(a1) == int and type(a2) == int: self.assign(args[0], a1^a2) else: a1 = long_to_bytes(a1).decode() if type(a1) == int else a1 a2 = long_to_bytes(a2).decode() if type(a2) == int else a2 self.assign(args[0], self.xorstr(a1, a2)) def xorstr(self, s1, s2): l = max(len(s1), len(s2)) s1 = s1.encode() s2 = s2.encode() ret = '' for i in range(l): ret += chr(s1[i%len(s1)]^s2[i%len(s2)]) return ret def readint(self, *args): try: self.assign(args[0], int(input())) except ValueError as e: self.quit("Bad int input!") def readstr(self, *args): self.assign(args[0], input()) def pr(self, *args): print(self.getVal(args[0]), end='', flush=True) def strint(self, *args): a1 = self.getVal(args[1]) if type(a1) != str: self.quit("Attempting to convert non-string to int!") self.assign(args[0], bytes_to_long(bytes([ord(i) for i in a1]))) def intstr(self, *args): a1 = self.getVal(args[1]) if type(a1) != int: self.quit("Attempting to convert non-int to string!") try: b = bytes.fromhex(hex(a1)[2:]) except ValueError as e: if 'non-hexadecimal' not in str(e): raise e b = bytes.fromhex('0'+hex(a1)[2:]) self.assign(args[0], ''.join([chr(i) for i in b])) def revint(self, i): sign = 0 if not i else (1 if i>0 else -1) return sign*int(str(abs(i))[::-1]) def rev(self, *args): a1 = self.getVal(args[1]) if type(a1) == int: ret = self.revint(a1) else: ret = a1[::-1] self.assign(args[0], ret) def mov(self, *args): self.assign(args[0], self.getVal(args[1])) def jump(self, *args): for i, insn in enumerate(self.program): if insn == args[0]+':': self.assign('rip', i) return self.quit("Could not find label "+args[0]+"!") def jz(self, *args): if self.getVal(args[0]) == 0: self.jump(args[1]) def jnz(self, *args): if self.getVal(args[0]) != 0: self.jump(args[1]) def jl(self, *args): if self.getVal(args[0]) < self.getVal(args[1]): self.jump(args[2]) def readf(self, *args): a1 = self.getVal(args[1]) if type(a1) != str: self.quit("Filename not str!") try: with open(a1, 'r') as f: self.assign(args[0], f.read()) except FileNotFoundError: self.quit("File "+a1+" not found!") def writef(self, *args): a1 = self.getVal(args[1]) if type(a1) != str: a1 = str(a1) try: with open(a1, 'w') as f: f.write(str(self.getVal(args[0]))) except FileNotFoundError: self.quit("File "+a1+" not found!") def exec(self, *args): code = self.getVal(args[0]) if type(code) == int: code = ''.join([chr(i) for i in long_to_bytes(code)]) tempVM = VM(program=code, memory=self.mem) ip = self.mem.rip() tempVM.run() self.mem = tempVM.mem self.assign('rip', ip) if __name__ == '__main__': args = sys.argv if len(args) < 2: self.quit("Usage: ./icicle.py [filename]", 0) with open(sys.argv[1], 'r') as f: vm = VM(program=f.read()) vm.run()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/pwn/Frozen_exploit/icicle.py
ctfs/ImaginaryCTF/2021/pwn/Frozen_exploit/icicle.py
import ast, operator, random, string, sys from itertools import cycle TRACE = False def as_b(x): if isinstance(x, bytes): return x return str(x).encode() def bytes_to_long(a): return int.from_bytes(a, "big") def long_to_bytes(a): return a.to_bytes((a.bit_length() + 7) // 8, "big") or b"\x00" def equalize(a, b, conv=as_b): if type(a) == type(b): return a, b if not isinstance(a, bytes): return conv(a), b if not isinstance(b, bytes): return a, conv(b) return a, b def safesplit(s, sep=None, n=None): def sepstart(x): if sep is not None: return x.startswith(sep), len(sep) y = x while y and y[0] in string.whitespace: y = y[1:] return len(y) != len(x), len(x) - len(y) instr = False parts = [] i = 0 start = 0 while i < len(s): if s[i] == '"': instr = not instr elif s[i] == '\\' and s[i+1] == '"': i += 1 elif not instr: is_sep, L = sepstart(s[i:]) if is_sep: parts.append(s[start:i]) i += L start = i if n is not None: n -= 1 if n <= 0: break continue i += 1 parts.append(s[start:]) return parts class Val: def __init__(self, vm, arg): self.vm = vm self.arg = arg self.child = None if arg.startswith("["): assert arg.endswith("]") self.child = Val(vm, arg[1:-1]) def __call__(self): if self.arg.startswith("r"): return self.vm.regs[self.arg] elif self.arg.startswith("["): return self.vm.memory[self.child()] r = ast.literal_eval(self.arg) if not isinstance(r, int): return as_b(r) return r def store(self, val): assert self.arg.startswith("r") or self.arg.startswith("[") if self.arg.startswith("r"): self.vm.regs[self.arg] = val else: self.vm.memory[self.child()] = val def loc(self): if self.arg in self.vm.labels: return self.vm.labels[self.arg] else: return self() def __str__(self): return self.arg def wrap(f): return lambda self, r, a, b: r.store(f(*equalize(a(), b()))) def cjump(cond): def f(self, *args): if cond(*args[:-1]): self._vm.regs["rip"] = args[-1].loc() return f def store_left_evaled(f): return lambda self, r, *args: r.store(f(*[x() for x in args])) def xor(a, b): a, b = equalize(a, b, long_to_bytes) if isinstance(a, int): return a ^ b a, b = sorted([a, b], key=len) return bytes(x ^ y for x, y in zip(cycle(a), b)) class Op: def __init__(self, vm, op, args): self._vm = vm self._op = op self._args = [Val(vm, arg) for arg in args] def __call__(self): return getattr(self, f"op_{self._op}")(*self._args) def __str__(self): return f"{self._op} {', '.join(map(str, self._args))}" op_add = wrap(operator.add) op_sub = wrap(operator.sub) op_mult = wrap(operator.mul) op_div = wrap(operator.floordiv) op_mod = wrap(operator.mod) op_and = wrap(operator.and_) op_or = wrap(operator.or_) op_xor = store_left_evaled(xor) op_rev = store_left_evaled(lambda a: type(a)(as_b(a)[::-1])) op_mov = store_left_evaled(lambda a: a) op_strint = store_left_evaled(bytes_to_long) op_intstr = store_left_evaled(long_to_bytes) def op_pr(self, x): print(as_b(x()).decode(), end="") op_readstr = store_left_evaled(lambda: sys.stdin.buffer.readline()[:-1]) op_readint = store_left_evaled(lambda: int(input())) op_j = cjump(lambda: True) op_jnz = cjump(lambda x: x() != 0) op_jz = cjump(lambda x: x() == 0) op_jl = cjump(lambda a, b: a() < b()) op_randbyte = store_left_evaled(lambda: random.randrange(256)) def op_flag(self, r): with open("flag.txt", "rb") as f: r.store(f.read()) class VM: def __init__(self, instructions): self.instructions = instructions self.regs = {f"r{i}": 0 for i in range(16)} | {"rip": 0} self.memory = [0 for _ in range(1<<16)] self.labels = {} @classmethod def from_file(cls, file): res = VM([]) res._parse(file.readlines()) return res def _parse_line(self, line): line = safesplit(line, "#", 1)[0] if not line.strip(): return None line = " ".join(safesplit(line.strip())) op, args = safesplit(line + " ", " ", 1) if line.strip().endswith(":"): self.labels[line[:-1]] = len(self.instructions) return None return Op(self, op, safesplit(args.strip(), ", ")) def _parse(self, lines): for line in lines: if (op := self._parse_line(line)) is not None: self.instructions.append(op) def run(self): while True: rip = self.regs["rip"] if not 0 <= rip < len(self.instructions): break op = self.instructions[rip] self.regs["rip"] += 1 if TRACE: print(f"Executing {op}", file=sys.stderr) print("\n".join(f"{k}: {v}" for k, v in sorted(self.regs.items())), file=sys.stderr) print(self.memory[self.regs["r14"]:self.regs["r14"] + 50], file=sys.stderr) # Dumping the stack frame :) print(file=sys.stderr) op() if __name__ == "__main__": random.seed(0x31337 + 42) if len(sys.argv) > 1: f = open(sys.argv[1]) else: f = sys.stdin if "TRACE" in sys.argv[2:]: TRACE = True VM.from_file(f).run()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/rev/ICICLEs_Facing_the_Sky/icicle.py
ctfs/ImaginaryCTF/2021/rev/ICICLEs_Facing_the_Sky/icicle.py
#!/usr/bin/env python3 import sys from Crypto.Util.number import * import time MEMSIZE = 2**16 REGNAMES = ["r%d"%i for i in range(16)]+['rip'] DEBUG = 0 def prd(*args): if DEBUG: print(*args) class MemoryException(Exception): pass class Memory(): def __init__(self, size=MEMSIZE, mem=None, rnames=REGNAMES): if mem is not None: self.size = mem.size self.regs = {k:mem.regs[k] for k in mem.regs} self.ram = {k:mem.ram[k] for k in mem.ram} self.regs['rip'] = 0 else: self.size = size self.regs = {r:0 for r in rnames} self.ram = {} def setRam(self, addr, val): if type(addr) != int: raise MemoryException("Attempting to access invalid memory address "+str(addr)) if addr < 0 or addr >= self.size: raise MemoryException("Memory "+str(addr)+" out of bounds!") self.ram[addr] = val def getRam(self, addr): if type(addr) != int: raise MemoryException("Attempting to access invalid memory address "+str(addr)) if addr < 0 or addr >= self.size: raise MemoryException("Memory "+str(addr)+" out of bounds!") if addr in self.ram: return self.ram[addr] self.ram[addr] = 0 return 0 def getVal(self, val): if type(val) != str or len(val) == 0: raise MemoryException("Bad value "+str(val)+" recieved!") if val.isdigit(): return int(val) if val in self.regs: return self.regs[val] if val[0] == '[' and val[-1] == ']': return self.getRam(self.getVal(val[1:-1])) if val[0] == '"' and val[-1] == '"': return val[1:-1] if val[0] == "'" and val[-1] == "'": return val[1:-1] raise MemoryException("Bad value "+str(val)+" recieved!") def assign(self, loc, val): if type(loc) != str or len(loc) == 0: raise MemoryException("Bad location "+str(loc)+" recieved!") if loc in self.regs: self.regs[loc] = val return if loc[0] == '[' and loc[-1] == ']': self.setRam(self.getVal(loc[1:-1]), val) def rip(self): return self.regs['rip'] def inc_rip(self): self.regs['rip'] += 1 class VM(): def __init__(self, program='', memory=None): self.program = self.parseStr(program) if memory is not None: self.mem = Memory(mem=memory) else: self.mem = Memory(size=MEMSIZE) self.insns_map = {"add": self.add, "sub": self.sub, "mult": self.mult, "div": self.div, "mod": self.mod, "xor": self.xor, "and": self.andd, "or": self.orr, "rev": self.rev, "mov": self.mov, "strint": self.strint, "intstr": self.intstr, "pr": self.pr, "readstr": self.readstr, "readint": self.readint, "j": self.jump, "jnz": self.jnz, "jz": self.jz, "jl": self.jl, } # also labels def quit(self, msg='', exitcode=1, test=False): if exitcode != 0: print("Error running line '", self.c_insn(), "' at insn pointer", self.mem.rip()) if msg == '': print("Quitting...") else: print(msg) exit(exitcode) def parseStr(self, s): return [line.strip() for line in s.split('\n')] def parseInsn(self, insn): args = insn.split("#")[0].strip().split(" ") cmd = args[0] rest = " ".join(args[1:]).strip().split(", ") return [cmd]+rest def c_insn(self): return self.program[self.mem.rip()] def run(self): try: while self.mem.rip() < len(self.program): prd("Executing '"+self.c_insn()+"' at insn_pointer "+str(self.mem.rip())) self.execute_insn(self.c_insn()) self.mem.inc_rip() except MemoryException as e: self.quit(str(e)) except Exception as e: print("Unknown error occurred.") if DEBUG: raise e self.quit() def execute_insn(self, insn): if insn == '' or insn[-1] == ':' or insn[0] == "#": return args = self.parseInsn(insn) prd(args) self.insns_map[args[0]](*args[1:]) def setRam(self, addr, val): return self.mem.setRam(addr, val) def getRam(self, addr): return self.mem.getRam(addr) def getVal(self, val): return self.mem.getVal(val) def assign(self, loc, val): return self.mem.assign(loc, val) def reset(self): self.mem = Memory() def add(self, *args): a1 = self.getVal(args[1]) a2 = self.getVal(args[2]) if type(a1) != type(a2): a1 = str(a1) a2 = str(a2) self.assign(args[0], a1+a2) def sub(self, *args): a1 = self.getVal(args[1]) a2 = self.getVal(args[2]) if type(a1) != int or type(a2) != int: self.quit("sub args not int!") self.assign(args[0], a1-a2) def mult(self, *args): a1 = self.getVal(args[1]) a2 = self.getVal(args[2]) if type(a1) == str or type(a2) == str: self.quit("Both mult args are strings!") self.assign(args[0], a1*a2) def div(self, *args): a1 = self.getVal(args[1]) a2 = self.getVal(args[2]) if type(a1) != int or type(a2) != int: self.quit("div args not int!") self.assign(args[0], a1//a2) def mod(self, *args): a1 = self.getVal(args[1]) a2 = self.getVal(args[2]) if type(a1) != int or type(a2) != int: self.quit("mod args not int!") self.assign(args[0], a1%a2) def andd(self, *args): a1 = self.getVal(args[1]) a2 = self.getVal(args[2]) if type(a1) != int or type(a2) != int: self.quit("and args not int!") self.assign(args[0], a1&a2) def orr(self, *args): a1 = self.getVal(args[1]) a2 = self.getVal(args[2]) if type(a1) != int or type(a2) != int: self.quit("or args not int!") self.assign(args[0], a1|a2) def xor(self, *args): a1 = self.getVal(args[1]) a2 = self.getVal(args[2]) if type(a1) == int and type(a2) == int: self.assign(args[0], a1^a2) else: a1 = long_to_bytes(a1).decode() if type(a1) == int else a1 a2 = long_to_bytes(a2).decode() if type(a2) == int else a2 self.assign(args[0], self.xorstr(a1, a2)) def xorstr(self, s1, s2): l = max(len(s1), len(s2)) s1 = s1.encode() s2 = s2.encode() ret = '' for i in range(l): ret += chr(s1[i%len(s1)]^s2[i%len(s2)]) return ret def readint(self, *args): try: self.assign(args[0], int(input())) except ValueError as e: self.quit("Bad int input!") def readstr(self, *args): self.assign(args[0], input()) def pr(self, *args): print(self.getVal(args[0]), end='', flush=True) def strint(self, *args): a1 = self.getVal(args[1]) if type(a1) != str: self.quit("Attempting to convert non-string to int!") self.assign(args[0], bytes_to_long(bytes([ord(i) for i in a1]))) def intstr(self, *args): a1 = self.getVal(args[1]) if type(a1) != int: self.quit("Attempting to convert non-int to string!") try: b = bytes.fromhex(hex(a1)[2:]) except ValueError as e: if 'non-hexadecimal' not in str(e): raise e b = bytes.fromhex('0'+hex(a1)[2:]) self.assign(args[0], ''.join([chr(i) for i in b])) def revint(self, i): sign = 0 if not i else (1 if i>0 else -1) return sign*int(str(abs(i))[::-1]) def rev(self, *args): a1 = self.getVal(args[1]) if type(a1) == int: ret = self.revint(a1) else: ret = a1[::-1] self.assign(args[0], ret) def mov(self, *args): self.assign(args[0], self.getVal(args[1])) def jump(self, *args): for i, insn in enumerate(self.program): if insn == args[0]+':': self.assign('rip', i) return self.quit("Could not find label "+args[0]+"!") def jz(self, *args): if self.getVal(args[0]) == 0: self.jump(args[1]) def jnz(self, *args): if self.getVal(args[0]) != 0: self.jump(args[1]) def jl(self, *args): if self.getVal(args[0]) < self.getVal(args[1]): self.jump(args[2]) if __name__ == '__main__': args = sys.argv if len(args) < 2: self.quit("Usage: ./icicle.py [filename]", 0) with open(sys.argv[1], 'r') as f: vm = VM(program=f.read()) vm.run()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/rev/Roolang/roolang.py
ctfs/ImaginaryCTF/2021/rev/Roolang/roolang.py
#!/usr/bin/env python3 import sys from PIL import Image import numpy as np class Stack(list): def push(self, x): self.append(x) def peek(self): return self[-1] stack = Stack([]) program = [] register = 0 insn_pointer = 0 DEBUG = 0 def robinify(im): tiles = [im[x:x+128,y:y+128,0:4] for x in range(0,im.shape[0],128) for y in range(0,im.shape[1],128)] R = np.asarray(Image.open("robin.roo")) O = np.asarray(Image.open("oreos.roo")) B = np.asarray(Image.open("blind.roo")) I = np.asarray(Image.open("imag.roo")) N = np.asarray(Image.open("nobooli.roo")) d = list(zip([R,O,B,I,N], "robin")) ret = '' for c in tiles: for pair in d: if np.all(pair[0]==c): ret += pair[1] break return ret def step(): global insn_pointer insn = c_insn() if DEBUG: print(insn, program[insn_pointer+1], "@", insn_pointer) eval(insn+"()") def run(prog): global insn_pointer, program for ch in prog: if ch not in "robin": print("Syntax Error") exit(1) if len(prog) % 5 != 0: print("Syntax Error") program = [prog[i:i+5] for i in range(0, len(prog), 5)] try: while insn_pointer < len(program): step() insn_pointer += 1 if DEBUG: print(stack) except Exception as e: print("Fatal Error.") raise e print() print(stack) def c_insn(): return program[insn_pointer] def robin(): global insn_pointer insn_pointer += 1 toPush = c_insn() if toPush == "rinin": stack.push(register) else: words = parseDigit(toPush) toPush = 0 for i in range(words): insn_pointer += 1 toPush += parseDigit(c_insn()) toPush *= 27 stack.push(toPush//27) def parseDigit(s): return int(s.replace('o', '0').replace('b', '1').replace('i', '2')[1:-1], 3) def rboin(): stack.pop() def riobn(): stack.push(stack.pop()+stack.pop()) def rooon(): stack.push(stack.pop()-stack.pop()) def riibn(): stack.push(stack.pop()*stack.pop()) def riion(): stack.push(stack.pop()//stack.pop()) def ribon(): stack.push(stack.pop()%stack.pop()) def ronon(): stack.push(stack.pop()&stack.pop()) def roion(): stack.push(stack.pop()|stack.pop()) def roibn(): stack.push(stack.pop()^stack.pop()) def riiin(): x = stack.pop() stack.push(x) stack.push(x) def rioin(): x = stack.pop() y = stack.pop() stack.push(x) stack.push(y) def rinin(): global register register = stack.pop() def rbiin(): print(chr(stack.pop()), end='', flush=True) def rboon(): print(stack.pop(), end='', flush=True) def rnbon(): global insn_pointer insn_pointer += 1 def rioon(): global insn_pointer insn_pointer += 1 for i, word in enumerate(program): if word == "rnbon": if i != len(program)-1 and program[i+1] == c_insn(): insn_pointer = i+1 return print("Label not found!") raise RuntimeError def rbion(): global insn_pointer if stack.peek(): rioon() else: insn_pointer += 1 def ribbn(): global insn_pointer retval = stack.pop() insn_pointer = stack.pop() if DEBUG: print("returning to", insn_pointer) stack.push(retval) def roiin(): global insn_pointer arg = stack.pop() stack.push(insn_pointer+1) stack.push(arg) rioon() if __name__ == "__main__": if len(sys.argv) < 2: print("Usage: ./roolang.py [filename.roo]") exit() if sys.argv[1].split('.')[-1] != "roo": print("Invalid file format!") exit() with Image.open(sys.argv[1]) as f: print("Parsing...") program = robinify(np.asarray(f)) print("Running...") run(program) print("Finished execution.")
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/rev/lookup-rev/wpre.py
ctfs/ImaginaryCTF/2021/rev/lookup-rev/wpre.py
from math import sqrt from itertools import count, islice def sequence(index): """ Generate a W*****l number given the index """ element = (index << index) - 1 return element def is_prime(n): """ Check if a given number is prime """ return all(n % i for i in islice(count(2), int(sqrt(n)-1))) key = [0x6b, 0x60, 0x72, 0x78, 0x30, 0x3d, 0x3f, 0x27, 0x5a, 0x4b, 0x24, 0x61, 0x7b, 0x3, 0x26, 0x68, 0x56, 0x73, 0x23, 0x49, 0x25, 0x35, 0x34, 0x77, 0x77, 0x22, 0x18, 0x34, 0x77, 0x5a, 0x6b, 0x60, 0x4d] i = 2 while key != []: if is_prime(sequence(i)): print(chr(key[0]^i%100)) key.pop(0) i += 1 else: i += 1
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/rev/Salty/bash.py
ctfs/ImaginaryCTF/2021/rev/Salty/bash.py
#!/usr/bin/env python3 import os import hashlib def main(): while True: command = input("bash-4.2$ ") checkInput(command) os.system(command) def checkInput(inp): if hashlib.sha512(("salt" + inp).encode()).hexdigest() == "".join([chr(ord(n) ^ 69) for n in "p\'|$!$\'\'rttvp#\'utvw# q \'$#v#v\'#|qupr&t\'| ursvvu#vr&\'!!|q!p\'!q#uuw}&v v}!q\'s\'trrrv!!q|#& s$p$# r#$\'#&&\'#}p!sqpw |\'t#r} pqwv!p&$u&"]): print("You win!") print("".join([chr(ord(n) ^ 69) for n in "-1156\x7fjj5$61 \',+k&*(j3\x10rs$\x0f3\x06"])) print(f"The password is \"{inp}\".") os.system("clear") if __name__ == "__main__": main()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/rev/ReDOS/redos.py
ctfs/ImaginaryCTF/2021/rev/ReDOS/redos.py
#!/usr/local/bin/python import re # https://pypi.org/project/timeout-decorator/ import timeout_decorator currentUser = None users = {"admin@gmail.com":"REDACTED"} emailRegex = re.compile(r'[A-Za-z0-9]+@((gmail)+)*\.(com|org|edu|gg)') class TimeoutError(Exception): pass def checkUserExists(email): return email in users.keys() def login(): global currentUser email = input("Email: ") if not checkUserExists(email): print("Sorry, we couldn't find that user in our database.") return pw = input("Password: ") if pw == users[email]: currentUser = email print("Login success!") else: print("Credentials incorrect.") def getNewPass(email): pw = input("Password (at least 8 chars): ") pw2 = input("Enter Password Again: ") if len(pw) < 8: print("Sorry, that password doesn't match our security standards.") return None if pw != pw2: print("Those passwords don't match!") return None users[email] = pw return pw @timeout_decorator.timeout(10, timeout_exception=TimeoutError) def validateEmail(email): return emailRegex.match(email) is not None def createAcc(): email = input("Email: ") if not validateEmail(email): print("Sorry, that's not a valid email.") return if checkUserExists(email): print("Sorry, that user already exists in our database.") return if getNewPass(email) is not None: print("Account creation successful! Please login as your new account.") def changePass(): if currentUser == None: print("You are not currently logged in!") return currpw = input("Please enter your current password: ") if currpw != users[currentUser]: print("Credentials incorrect.") return if getNewPass(currentUser) is not None: print("Password changed successfully!") def menu(): print() print("="*80) print() if currentUser is not None: print("Hello {}!".format(currentUser)) print("Welcome back to Super Secure Server(tm)!") print("1. Change User") else: print("Welcome to Super Secure Server(tm)!") print("1: Login") print("2: Create Account") print("3: Change Password") print() inp = input("Enter your choice: ") print() if '1' in inp: login() if '2' in inp: createAcc() if '3' in inp: changePass() if __name__ == '__main__': try: while True: menu() except TimeoutError as e: print("Catastrophic Error") print("Error code: "+open("flag.txt", "r").read()) print() print("Server shutting down...")
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/rev/Ay_Yi_Yi/iii.py
ctfs/ImaginaryCTF/2021/rev/Ay_Yi_Yi/iii.py
#!/usr/bin/env python3 from icicle import * from PIL import Image def iii_to_png(fname): assert fname[-4:] == ".iii" iii = open(fname, 'rb').read() assert iii[:4] == b"\x7fIiI" iii = iii[4:] w = bytes_to_long(iii[:2]) h = bytes_to_long(iii[2:4]) iii = iii[4:] assert len(iii)%3 == 0 png = Image.new("RGB", (w, h)) for i in range(0, len(iii), 3): idx = i//3 png.putpixel((idx//h, idx%h), (iii[i], iii[i+1], iii[i+2])) png.save(fname[:-4] + ".png") def png_to_iii(fname): assert fname[-4:] == ".png" png = Image.open(fname) png = png.convert("RGB") out = b'\x7fIiI' outfile = fname[:-4]+'.iii' outfile = open(outfile, "wb") w, h = png.size out += bytes([(w>>8)&0xff]) out += bytes([w&0xff]) out += bytes([(h>>8)&0xff]) out += bytes([h&0xff]) for x in range(w): for y in range(h): rgb = png.getpixel((x, y)) for color in rgb: out += bytes([color]) outfile.write(out) outfile.close() def hide_data(fname, data): assert fname[-4:] == ".iii" vm = VM(program=open("stego.s").read(), testing=1, inp=[fname, data], limit=9999) vm.run() print(vm.output_buffer) def main(): print("Welcome to the ICICLE Image Interchange!") print() print("1) Convert png to iii") print("2) Convert iii to png") print("3) Encrypt data in iii file") print() inp = input('>>> ') if '1' in inp: png_to_iii(input("Enter filename: ")) elif '2' in inp: iii_to_png(input('Enter filename: ')) elif '3' in inp: hide_data(input("Enter image filename: "), input("Enter flag: ")) if __name__ == '__main__': main()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/rev/Ay_Yi_Yi/icicle.py
ctfs/ImaginaryCTF/2021/rev/Ay_Yi_Yi/icicle.py
#!/usr/bin/env python3 import sys from Crypto.Util.number import * import time MEMSIZE = 2**16 REGNAMES = ["r%d"%i for i in range(16)]+['rip'] DEBUG = 0 def prd(*args): if DEBUG: print(*args) class MemoryException(Exception): pass class ICICLEException(Exception): pass class Memory(): def __init__(self, size=MEMSIZE, mem=None, rnames=REGNAMES): if mem is not None: self.size = mem.size self.regs = {k:mem.regs[k] for k in mem.regs} self.ram = {k:mem.ram[k] for k in mem.ram} self.regs['rip'] = 0 else: self.size = size self.regs = {r:0 for r in rnames} self.ram = {} def setRam(self, addr, val): if type(addr) != int: raise MemoryException("Attempting to access invalid memory address "+str(addr)) if addr < 0 or addr >= self.size: raise MemoryException("Memory "+str(addr)+" out of bounds!") self.ram[addr] = val def getRam(self, addr): if type(addr) != int: raise MemoryException("Attempting to access invalid memory address "+str(addr)) if addr < 0 or addr >= self.size: raise MemoryException("Memory "+str(addr)+" out of bounds!") if addr in self.ram: return self.ram[addr] self.ram[addr] = 0 return 0 def getVal(self, val): if type(val) != str or len(val) == 0: raise MemoryException("Bad value "+str(val)+" recieved!") if val.isdigit(): return int(val) if val in self.regs: return self.regs[val] if val[0] == '[' and val[-1] == ']': return self.getRam(self.getVal(val[1:-1])) if val[0] == '"' and val[-1] == '"': return val[1:-1] if val[0] == "'" and val[-1] == "'": return val[1:-1] raise MemoryException("Bad value "+str(val)+" recieved!") def assign(self, loc, val): if type(loc) != str or len(loc) == 0: raise MemoryException("Bad location "+str(loc)+" recieved!") if loc in self.regs: self.regs[loc] = val return if loc[0] == '[' and loc[-1] == ']': self.setRam(self.getVal(loc[1:-1]), val) def rip(self): return self.regs['rip'] def inc_rip(self): self.regs['rip'] += 1 class VM(): def __init__(self, program='', memory=None, testing=False, inp=[], limit=60): self.program = self.parseStr(program) self.input_buffer = inp self.output_buffer = "" self.testing = testing self.time_limit = limit if memory is not None: self.mem = Memory(mem=memory) else: self.mem = Memory(size=MEMSIZE) self.insns_map = {"add": self.add, "sub": self.sub, "mult": self.mult, "div": self.div, "mod": self.mod, "xor": self.xor, "and": self.andd, "or": self.orr, "rev": self.rev, "mov": self.mov, "strint": self.strint, "intstr": self.intstr, "pr": self.pr, "readstr": self.readstr, "readint": self.readint, "j": self.jump, "jnz": self.jnz, "jz": self.jz, "jl": self.jl, "readf": self.readf, "writef": self.writef, "exec": self.exec, } def quit(self, msg='', exitcode=1, test=False): if exitcode != 0: print("Error running line '", self.c_insn(), "' at insn pointer", self.mem.rip()) if msg == '': print("Quitting...") else: print(msg) if self.testing: raise ICICLEException(msg) exit(exitcode) def parseStr(self, s): return [line.strip() for line in s.split('\n')] def parseInsn(self, insn): args = insn.split("#")[0].strip().split(" ") cmd = args[0] rest = " ".join(args[1:]).strip().split(", ") return [cmd]+rest def c_insn(self): return self.program[self.mem.rip()] def run(self): self.start_time = time.time() try: while self.mem.rip() < len(self.program): prd("Executing '"+self.c_insn()+"' at insn_pointer "+str(self.mem.rip())) self.execute_insn(self.c_insn()) self.mem.inc_rip() except MemoryException as e: self.quit(str(e)) except ICICLEException as e: raise e except Exception as e: print("Unknown error occurred.") if DEBUG: raise e self.quit() def execute_insn(self, insn): if time.time()-self.start_time > self.time_limit: self.quit("Time limit exceeded!") if insn == '' or insn[-1] == ':' or insn[0] == "#": return args = self.parseInsn(insn) prd(args) self.insns_map[args[0]](*args[1:]) def setRam(self, addr, val): return self.mem.setRam(addr, val) def getRam(self, addr): return self.mem.getRam(addr) def getVal(self, val): return self.mem.getVal(val) def assign(self, loc, val): return self.mem.assign(loc, val) def reset(self): self.mem = Memory() def add(self, *args): a1 = self.getVal(args[1]) a2 = self.getVal(args[2]) if type(a1) != type(a2): a1 = str(a1) a2 = str(a2) self.assign(args[0], a1+a2) def sub(self, *args): a1 = self.getVal(args[1]) a2 = self.getVal(args[2]) if type(a1) != int or type(a2) != int: self.quit("sub args not int!") self.assign(args[0], a1-a2) def mult(self, *args): a1 = self.getVal(args[1]) a2 = self.getVal(args[2]) if type(a1) == str or type(a2) == str: self.quit("Both mult args are strings!") self.assign(args[0], a1*a2) def div(self, *args): a1 = self.getVal(args[1]) a2 = self.getVal(args[2]) if type(a1) != int or type(a2) != int: self.quit("div args not int!") self.assign(args[0], a1//a2) def mod(self, *args): a1 = self.getVal(args[1]) a2 = self.getVal(args[2]) if type(a1) != int or type(a2) != int: self.quit("mod args not int!") self.assign(args[0], a1%a2) def andd(self, *args): a1 = self.getVal(args[1]) a2 = self.getVal(args[2]) if type(a1) != int or type(a2) != int: self.quit("and args not int!") self.assign(args[0], a1&a2) def orr(self, *args): a1 = self.getVal(args[1]) a2 = self.getVal(args[2]) if type(a1) != int or type(a2) != int: self.quit("or args not int!") self.assign(args[0], a1|a2) def xor(self, *args): a1 = self.getVal(args[1]) a2 = self.getVal(args[2]) if type(a1) == int and type(a2) == int: self.assign(args[0], a1^a2) else: a1 = long_to_bytes(a1).decode() if type(a1) == int else a1 a2 = long_to_bytes(a2).decode() if type(a2) == int else a2 self.assign(args[0], self.xorstr(a1, a2)) def xorstr(self, s1, s2): l = max(len(s1), len(s2)) s1 = s1.encode() s2 = s2.encode() ret = '' for i in range(l): ret += chr(s1[i%len(s1)]^s2[i%len(s2)]) return ret def readint(self, *args): try: if self.testing: if len(self.input_buffer) <= 0: self.quit("Attempted to read from empty input buffer!") self.assign(args[0], int(self.input_buffer[0])) self.input_buffer = self.input_buffer[1:] else: self.assign(args[0], int(input())) except ValueError as e: self.quit("Bad int input!") def readstr(self, *args): if self.testing: if len(self.input_buffer) <= 0: self.quit("Attempted to read from empty input buffer!") self.assign(args[0], str(self.input_buffer[0])) self.input_buffer = self.input_buffer[1:] else: self.assign(args[0], input()) def pr(self, *args): if self.testing: self.output_buffer += str(self.getVal(args[0])) else: print(self.getVal(args[0]), end='', flush=True) def strint(self, *args): a1 = self.getVal(args[1]) if type(a1) != str: self.quit("Attempting to convert non-string to int!") self.assign(args[0], bytes_to_long(bytes([ord(i) for i in a1]))) def intstr(self, *args): a1 = self.getVal(args[1]) if type(a1) != int: self.quit("Attempting to convert non-int to string!") try: b = bytes.fromhex(hex(a1)[2:]) except ValueError as e: if 'non-hexadecimal' not in str(e): raise e b = bytes.fromhex('0'+hex(a1)[2:]) self.assign(args[0], ''.join([chr(i) for i in b])) def revint(self, i): sign = 0 if not i else (1 if i>0 else -1) return sign*int(str(abs(i))[::-1]) def rev(self, *args): a1 = self.getVal(args[1]) if type(a1) == int: ret = self.revint(a1) else: ret = a1[::-1] self.assign(args[0], ret) def mov(self, *args): self.assign(args[0], self.getVal(args[1])) def jump(self, *args): for i, insn in enumerate(self.program): if insn == args[0]+':': self.assign('rip', i) return self.quit("Could not find label "+args[0]+"!") def jz(self, *args): if self.getVal(args[0]) == 0: self.jump(args[1]) def jnz(self, *args): if self.getVal(args[0]) != 0: self.jump(args[1]) def jl(self, *args): if self.getVal(args[0]) < self.getVal(args[1]): self.jump(args[2]) def readf(self, *args): a1 = self.getVal(args[1]) if type(a1) != str: self.quit("Filename not str!") try: with open(a1, 'rb') as f: self.assign(args[0], ''.join([chr(i) for i in f.read()])) except FileNotFoundError: self.quit("File "+a1+" not found!") def writef(self, *args): a1 = self.getVal(args[1]) if type(a1) != str: a1 = str(a1) try: with open(a1, 'wb') as f: f.write(bytes([ord(i) for i in str(self.getVal(args[0]))])) except FileNotFoundError: self.quit("File "+a1+" not found!") def exec(self, *args): code = self.getVal(args[0]) if type(code) == int: code = ''.join([chr(i) for i in long_to_bytes(code)]) tempVM = VM(program=code, memory=self.mem) ip = self.mem.rip() tempVM.run() self.mem = tempVM.mem self.assign('rip', ip) if __name__ == '__main__': args = sys.argv if len(args) < 2: self.quit("Usage: ./icicle.py [filename]", 0) with open(sys.argv[1], 'r') as f: vm = VM(program=f.read()) vm.run()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/rev/filling-blanks/solve.py
ctfs/ImaginaryCTF/2021/rev/filling-blanks/solve.py
from pwn import * from ctypes import CDLL, c_int exe = ELF('./predict', checksec=False) libc = CDLL('libc.so.6') p = process(exe.path) # p = remote('20.94.210.205', 1337) constants = [____.rand() for i in range(4)] p.recvuntil('flag: \n') seed = libc.____(0) // 10 libc.srand(seed) for i in range(4): random = libc.rand() constants[i] = _____(constants[i] * (random % 1000)) constants = [i._____ for i in constants] guess = c_int(sum(constants)).value p.sendline(str(guess)) print(p.recv())
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/Flip_Flops/flop.py
ctfs/ImaginaryCTF/2021/crypto/Flip_Flops/flop.py
#!/usr/local/bin/python from Crypto.Cipher import AES from Crypto.Util.Padding import pad, unpad import binascii import os print(''' ,,~~~~~~,,.. ...., ,'~ | \ V / \ / / ;####> @@@@@ ) ##;, @@@@@@@ ) .##/ ~> @@@@@ . . ###''#> ' ' .:::::::. ..###/ #> ' ' //////))))----~~ ## #} ' ' ///////)))))) ' ' ///////)))))))\ ' ' //////))))))))))) ' |////)))))))))))))____________________________________). ||||||||||||||||||||||||||||||||||||||||||||||||||||||||| (yeah they're not flip flops but close enough) ''') key = os.urandom(16) iv = os.urandom(16) flag = open("flag.txt").read().strip() for _ in range(3): print("Send me a string that when decrypted contains 'gimmeflag'.") print("1. Encrypt") print("2. Check") choice = input("> ") if choice == "1": cipher = AES.new(key, AES.MODE_CBC, iv) pt = binascii.unhexlify(input("Enter your plaintext (in hex): ")) if b"gimmeflag" in pt: print("I'm not making it *that* easy for you :kekw:") else: print(binascii.hexlify(cipher.encrypt(pad(pt, 16))).decode()) else: cipher = AES.new(key, AES.MODE_CBC, iv) ct = binascii.unhexlify(input("Enter ciphertext (in hex): ")) assert len(ct) % 16 == 0 if b"gimmeflag" in cipher.decrypt(ct): print(flag) else: print("Bad") print("Out of operations!")
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/Roll_it_back/roll_it_back.py
ctfs/ImaginaryCTF/2021/crypto/Roll_it_back/roll_it_back.py
from itertools import * from gmpy2 import * def x(a,b): return bytes(islice((x^y for x,y in zip(cycle(a), cycle(b))), max(*map(len, [a, b])))) def t(x): return sum((((x & 28) >> 4) & 1) << i for i, x in enumerate(x)) T = t(x(b"jctf{not_the_flag}", b"*-*")) | 1 with open("flag.txt", "rb") as f: flag = int.from_bytes(f.read(), "little") l = flag.bit_length() print(f"{l = }") for _ in range(421337): flag = (flag >> 1) | ((popcount(flag & T) & 1) << (l - 1)) print(f"{flag = }") ### Output # l = 420 # flag = 2535320453775772016257932121117911974157173123778528757795027065121941155726429313911545470529920091870489045401698656195217643 ###
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/Do_Some_Arithmetic/do_some_arithmetic.py
ctfs/ImaginaryCTF/2021/crypto/Do_Some_Arithmetic/do_some_arithmetic.py
from Crypto.Util.number import bytes_to_long import hashlib, random with open("flag.txt", "rb") as f: flag = bytes_to_long(f.read().strip()) rnd = random.SystemRandom() def H(m): return bytes_to_long(hashlib.sha256(m).digest()) def sign(m, x): k = pow(g2, rnd.randint(1, q - 1), q) r = pow(g, k, p) % q s = (pow(k, -1, q) * (H(m) + x*r)) % q return r, s def verify(m, r, s, y): if not (0 < r < q) and (0 < s < q): return False w = pow(s, -1, q) u1 = (H(m) * w) % q u2 = (r * w) % q v = ((pow(g, u1, p) * pow(y, u2, p)) % p) % q return v == r q = 0xe53da909dc6d024303968079585b10104f1954c5f19a0a2f1f916825307584ef p = 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 g = 0x3c990a52040518d9800802965a8404164a9ef5e4d6dcbf65444cc4a610fdaee929dc5fcc98279f7ba8246ef310ef5cd578fed68a5289c63dd849685eb10636cab5cf4e6e1af3229d87331524a6018706f8c13a9464746b854c814109807d7fcc24186b3b24725aaa595829b4af4777e5ad4dc532474772e4b4dc7f81df10faf545d4af766d4dc9555a969779e1c51f5474c7406535860001085f20bab6cf8647737c575bf794ad21e68b215ad1c7cea74d49fd3f0ed4500d97b314b7b1a09687660552f079304bf1994122eb616d8d132e6518983a59ec9a3c1d9b4512019fcef74818ee632200a1f4264c2078176129e0326d700817208385c11d2a5fd31ecc g2 = 0x7859f6fd681b89043c6d67194def5f95415ac01863887405df6819bffe6edf6f assert flag < q y = pow(g, flag, p) m = b"Signing things, just for fun" r, s = sign(m, flag) assert verify(m, r, s, y) with open("output.txt", "w") as f: f.write(f"{y = }\n") f.write(f"{r = }\n") f.write(f"{s = }\n")
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/New_Technology/new_technology.py
ctfs/ImaginaryCTF/2021/crypto/New_Technology/new_technology.py
from Crypto.Cipher import AES from Crypto.Util.number import getPrime, getRandomRange from Crypto.Util.Padding import pad import hashlib, itertools from flag import FLAG def normalize(fac): n = 1 for p, e in fac: n *= p**e return n def gen(): private = [] for _ in range(5): p = getPrime(512) e = getRandomRange(1, 4) private.append((p, e)) return private, normalize(private) def divs(fac, pre=None): if pre is None: pre = [] if not fac: yield pre else: p, e = fac[0] for i in range(0, e + 1): yield from divs(fac[1:], pre + [(p, i)]) def div(a, b): b = dict(b) res = [] for p, e in a: assert e >= b[p] res.append((p, e - b[p])) return res def phi(fac): res = 1 for p, e in fac: if not e: continue res *= (p**(e - 1)) * (p - 1) return res def deriv(priv): res = 0 for d1 in divs(priv): for d2 in divs(d1): res += normalize(d2) * phi(d2) * phi(div(d1, d2)) return res priv, pub = gen() key = deriv(priv) cipher = AES.new(hashlib.sha256(str(key).encode("utf-8")).digest(), AES.MODE_CBC, iv=b"\0" * 16) ciphertext = cipher.encrypt(pad(FLAG.encode("utf-8"), 16)) print(f"pub: {hex(pub)}") print(f"ciphertext: {ciphertext.hex()}") ### # This printed: # # pub: 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 # ciphertext: d2463ccc52075674effbad1b1ea5ae9a9c8106f141cff8fdec9b118ddddcfb3a1f036ed5f3bf0440c95828ebf1c584e4 ###
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/Textbook_RSA_2_Timmy_the_Lonely_Oracle/oracle.py
ctfs/ImaginaryCTF/2021/crypto/Textbook_RSA_2_Timmy_the_Lonely_Oracle/oracle.py
#!/usr/bin/env -S python3 -u from Crypto.Util.number import * from hidden import p, q, flag1 e = 65537 n = p*q ns = str(n) ctxt = pow(bytes_to_long(flag1), e, n) class SneakyUserException(Exception): pass def print_ctxt(t): print("Here's the encrypted message:", t) print("e =", e) print("n =", ns) def encrypt(): global e, n, ctxt ptxt = bytes_to_long(input("What's your message to encrypt? ").encode("utf8")) print_ctxt(pow(ptxt, e, n)) def decrypt(): global e, p, q, n, ctxt try: c = int(input("What's your message to decrypt? ")) if c == ctxt: raise SneakyUserException d = pow(e, -1, (p-1)*(q-1)) m = pow(c, d, n) pt = long_to_bytes(m) if pt == flag1: raise SneakyUserException print("The decrypted message is",m) print() try: print("That spells out \""+pt.decode("utf8")+"\" if that means anything to you.") except UnicodeDecodeError as u: print("I couldn't figure out what that says ... are you sure you're doing it correctly?") except SneakyUserException as e: print("Hey, that's cheating! You can't ask me to decrypt the flag!") print("I'm not playing with you any more! Go cheat somewhere else.") exit() def menu(): print() print() print("1: Get Encrypted Flag") print("2: Encrypt Message") print("3: Decrypt Message") print("4: Quit") print() choice = int(input(">>> ")) if choice == 1: print_ctxt(ctxt) print() print("Good luck!") elif choice == 2: encrypt() elif choice == 3: decrypt() elif choice == 4: print("Come back again soon!") exit() if __name__ == '__main__': print("Hi! I'm Timmy! Have you come to play with my encryption system?") print("Just let me know what I can do for you!") while True: try: menu() except Exception as ex: print("Something's gone horribly wrong.") print("I have to go now. Bye!") exit()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/Too_Old/old.py
ctfs/ImaginaryCTF/2021/crypto/Too_Old/old.py
#!/usr/bin/env python3 import random from secret import flag key = random.randint(10**7, 10**8) out = b"" for c in flag: out += bytes([c ^ (key&0xff)]) key = int("{:016d}".format(key**2)[4:12]) print(f"{out.hex()}") # Output: # e649fd7458fb36acb341346324635da87427d8d25f5c8b7665b921052727bf730f1c0273d00c23217873
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/Caesar_Tart/caesartart.py
ctfs/ImaginaryCTF/2021/crypto/Caesar_Tart/caesartart.py
from random import randint with open('message.txt', 'r') as file: msg = ''.join(filter(str.isalpha, file.read().strip().upper())) def caesar(a, key): return chr(((ord(a) - 0x41 + key) % 26) + 0x41) keys = [randint(0, 25) for _ in range(randint(5, 10))] enc = [] for i, c in enumerate(msg): enc.append(caesar(c, keys[i % len(keys)])) print(''.join(enc)) # LMAPVMGYZGYUOVMVIAXWKQMUZQUWMAWWFCKIBJPIAWEVUFEINIAWJSSKWNWSBMVIKTFFHWHQVLXBWEBVVTOQMECUDOLETMHRCMXIRWBSLEZVZTWVCWWRDCOEXRSUHSVBUDUFWQIFLEILSNCWFZWWJQUASJWZKNXHALMCYTDWSXNLUJWRXWAIIYEZKUJCAXAWNQFLLQUPIFWETNFSFSDGCUOKSCMXLDHZSCIOJVWVMCYUOHTTGZYBSTXNLJOJXAVOUMSVMUAYZDHMNPSWGYAGUEIYLBJPIASHMOLXIFKZAPMOFRIGHJCFIVQDJVARSCIEILXPGZCSDPBJHJKSJBUAXFGYOJAXSSMZKUJCQSCTUEGWMUCNYBWXPGKUZAKPVMKZYSTFLDQGPWTHJWGRWHAXSLEZVPCGWVQQBIZQVCPUYBYSCVVVHZMVIZJCLITNPDVWVMUVYUMIAUDYHZSCVMKFLLMTHTCZIZGZOCMVNNHWWUXNOVHSDMSGCYUWRMTLJOJX
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/neat-rsa/main.py
ctfs/ImaginaryCTF/2021/crypto/neat-rsa/main.py
#!/usr/bin/python3 from Crypto.Util.number import getPrime, bytes_to_long from os import urandom with open('flag.txt', 'r') as f: flag = f.read() p, q, r = [getPrime(512) for _ in range(3)] n1, n2 = p * q, q * r e = 65537 elusive = bytes_to_long(urandom(4)) pt = bytes_to_long(flag.encode()) ct = pow(pt, e, n1) with open('rsa.txt', 'w') as g: g.write(f'n1 = {n1}\n') g.write(f'n2 + n1 * elusive = {n2 + n1 * elusive}\n') g.write(f'ct = {ct}\n')
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/Easy_Crypto_Challenge/super_safe_encryption.py
ctfs/ImaginaryCTF/2021/crypto/Easy_Crypto_Challenge/super_safe_encryption.py
from sage.all import * import os.path ############################################################## ################ NOT NEEDED TO SOLVE THE CHAL ################ ############################################################## def is_point_on_curve(P,a,b,p): x = P[0] y = P[1] if ((y**2) % p == (x**3 + a*x + b) % p): return true else: return false def get_s_from_x(x,a,b,p): """ s is the same as y**2 """ return (x**3 + a*x + b) % p def has_QRp(a, p): """ Euler's criterion x**2 = a % p -> does x exist? not all a's in p have an x """ if p % 2 == 0: return False return pow(a, (p-1) >> 1, p) == 1 def get_y_from_s(s,p): """ Tonellis Algorithm """ if not has_QRp(s, p): return 0 if (p % 4 == 3): return pow(s, (p + 1) / 4, p) h = 2 while (has_QRp(h, p)): h += 1 s_exp = (p-1) >> 1 h_exp = p-1 h_exp_half = (p-1) >> 1 res = (pow(s,s_exp, p) * pow(h, h_exp, p)) % p; # finished when (s_exp is odd) and (s^s_exp * h^h_exp == 1 (mod p)) while (s_exp % 2 == 0 or res != 1) : if (res == 1): s_exp = s_exp >> 1 h_exp = h_exp >> 1 else: h_exp = h_exp + h_exp_half res = (pow(s, s_exp, p) * pow(h, h_exp, p)) % p # pow(s, (s_exp + 1) / 2, p) * pow(h, (h_exp / 2), p)) % p; y = (pow(s, (s_exp + 1) >> 1, p) * pow(h, h_exp >> 1, p)) % p return y ############################################################## ################ NOT NEEDED TO SOLVE THE CHAL ################ ############################################################## # initialize the Eliptic Curve for my super safe encryption algorithm p = 692893 a = 1 b = 6 E = EllipticCurve(GF(p),[a,b]) # initialize Alice's parameters for my super safe encryption algorithm P = E(683798, 652629) kA = 4001 A = P * kA public_key_alice = (E,p,P,A) # initialize Bob's parameters for my super safe encryption algorithm kB = 2956 B = kB * P m = b"<REDACTED>" Ms = [] for M in m: # shift it so it has 5 new bits to find an x cordinate on the curve # reversible (after decryption) with M >> 5 M = M << 5 # find a point on the curve for i in range(2**5): x = M + i s = get_s_from_x(x, a, b, p) if has_QRp(s, p): y = get_y_from_s(s, p) Ms.append(E(x,y)) break else: raise Exception("No point found for char: " + chr(b)) # encrypt Bob's flag for Alice Cs = [] for M in Ms: C = M + kB * A Cs.append(str(C)) # encrypted = ['(139549 : 235923 : 1)', '(61125 : 136002 : 1)', '(260374 : 487393 : 1)', '(358186 : 437717 : 1)', '(450408 : 64836 : 1)', '(296195 : 499736 : 1)', '(636196 : 201912 : 1)', '(139817 : 13332 : 1)', '(595623 : 386881 : 1)', '(260374 : 487393 : 1)', '(47366 : 489310 : 1)', '(612562 : 56173 : 1)', '(260374 : 487393 : 1)', '(595623 : 386881 : 1)', '(139817 : 13332 : 1)', '(612562 : 56173 : 1)', '(349221 : 311135 : 1)', '(595623 : 386881 : 1)', '(218836 : 588967 : 1)', '(501307 : 184436 : 1)', '(440634 : 662065 : 1)', '(287706 : 158561 : 1)', '(318996 : 554853 : 1)'] if os.path.isfile("out.txt"): input("W0aH th3Re, y0U d0n'7 w4Nt T0 0veRwRite mY cIpH3r. W0n'T y0U, AlicE?") f = open("out.txt", "w") f.write("\n".join(Cs)) f.close()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/Easy_Crypto_Challenge/super_safe_decryption.py
ctfs/ImaginaryCTF/2021/crypto/Easy_Crypto_Challenge/super_safe_decryption.py
from sage.all import * # read encrypted Cs = open("out.txt", "r").readlines() # initialize same curve p = 692893 a = 1 b = 6 E = EllipticCurve(GF(p),[a,b]) # initialize Bob's decryption P = E(683798, 652629) kA = 4001 #!!!0hH no0... tH3 F1le g07 corRuPt3D!!!#56 B = #!!!0hH no0... tH3 F1le g07 corRuPt3D!!!#* P # convert encrypted to points on the curve Cs = [C.split(":") for C in Cs] Cs = [E(C[0][1:-1], C[1][1:-1]) for C in Cs] # now decrypt those points plain = "" for C in Cs: M = #!!!0hH no0... tH3 F1le g07 corRuPt3D!!!# x = M[0] plain += #!!!0hH no0... tH3 F1le g07 corRuPt3D!!!# >> 5) print(plain)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/Lines/lines.py
ctfs/ImaginaryCTF/2021/crypto/Lines/lines.py
from Crypto.Util.number import bytes_to_long import random flag = bytes_to_long(open("flag.txt", "rb").read()) msg = bytes_to_long(b":roocursion:") p = 82820875767540480278499859101602250644399117699549694231796720388646919033627 g = 2 a = random.randint(0, p) b = random.randint(0, p) s = pow(pow(g, a, p), b, p) def encrypt(msg): return (s*msg) % p print(f"{p = }") print(f"{encrypt(flag) = }") print(f"{encrypt(msg) = }")
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/Add_and_Add/add_and_add.py
ctfs/ImaginaryCTF/2021/crypto/Add_and_Add/add_and_add.py
import random with open("flag.txt") as f: flag = f.read().strip().encode() x = bytes([random.randrange(256)]) while flag: y = flag[:len(x)] flag = flag[len(x):] x += bytes([(a + b) % 256 for a, b in zip(x, y)]) with open("output.txt", "w") as f: f.write(x[1:].hex())
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/Horst/horst.py
ctfs/ImaginaryCTF/2021/crypto/Horst/horst.py
import hashlib ROUNDS = 25 BLOCKSIZE = 32 def xor(a, b): assert len(a) == len(b) return bytes(x ^ y for x, y in zip(a, b)) def F(x): return hashlib.sha256(x).digest() def round(x): assert len(x) == 2 * BLOCKSIZE L = x[:BLOCKSIZE] R = x[BLOCKSIZE:] return R + xor(L, F(R)) def encrypt(x): for _ in range(ROUNDS): x = round(x) return x if __name__ == "__main__": flag = open("flag.txt", "rb").read().strip() open("output.txt", "w").write(encrypt(flag).hex())
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/neatX2-rsa/main.py
ctfs/ImaginaryCTF/2021/crypto/neatX2-rsa/main.py
#!/usr/bin/python3 from Crypto.Util.number import getPrime, bytes_to_long from os import urandom with open('flag.txt', 'r') as f: flag = f.read() l = len(flag) f1, f2 = flag[:l//2], flag[l//2:] p, q, r = [getPrime(512) for _ in range(3)] n1, n2 = p * q, q * r e = 65537 elusive = bytes_to_long(urandom(4)) pt1 = bytes_to_long(f1.encode()) pt2 = bytes_to_long(f2.encode()) ct1 = pow(pt1, e, n1) ct2 = pow(pt2, e, n2) with open('rsa.txt', 'w') as g: g.write(f'n1 = {n1}\n') g.write(f'n2 + n1 * elusive = {n2 + n1 * elusive}\n') g.write(f'ct1 = {ct1}\n') g.write(f'ct2 = {ct2}\n')
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/ZKPoD/zkpod.py
ctfs/ImaginaryCTF/2021/crypto/ZKPoD/zkpod.py
#!/usr/local/bin/python from Crypto.Util.number import bytes_to_long, getRandomRange import hashlib N = 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 e = 0x10001 P = 0x199e1926f2d2d5967b1d230b33de0a249f958e5b962f8b82ca042970180fe1505607fe4c8cde04bc6d53aec53b4aa25255ae67051d6ed9b602b1b19e128835b20227db7ee19cf88660a50459108750f8b96c71847e4f38a79772a089aa46666404fd671ca17ea36ee9f401b4083f9ca76f5217588c6a15baba7eb4a0934e2026937812c96e2a5853c0e5a65231f3eb9fdc283e4177a97143fe1a3764dc87fd6d681f51f49f6eed5ab7ddc2a1da7206f77b8c7922c5f4a5cfa916b743ceeda943bc73d821d2f12354828817ff73bcd5800ed201c5ac66fa82df931c5bbc76e03e48720742ffe673b7786e40f243d7a0816c71eb641e5d58531242f7f5cfef60e5b g = 2 with open("flag.txt", "rb") as f: flag = bytes_to_long(f.read().strip()) assert flag < N with open("private.txt", "r") as f: d = int(f.read().strip()) def decrypt(c): return pow(c, d, N) def H(x): return bytes_to_long(hashlib.sha512(b"domain" + x).digest() + hashlib.sha512(b"separation" + x).digest()) def sign(x): k = getRandomRange(0, P - 1) r = pow(g, k, P) e = H(str(r).encode() + b"Haha, arbitrary message") s = (k - x * e) % (P - 1) return r, s print(f"Here's my encrypted flag: {hex(pow(flag, e, N))}") print("To prove that I can correctly decrypt whatever you send to me, I'll use decryptions to sign messages") while True: print("> ", end="") c = int(input(), 16) m = decrypt(c) r, s = sign(m) print(f"r: {r}") print(f"s: {s}")
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/small_enough/small_enough.py
ctfs/ImaginaryCTF/2021/crypto/small_enough/small_enough.py
from Crypto.Util.number import getPrime, bytes_to_long from math import prod ps = [getPrime(512) for _ in range(5)] N1 = prod(ps[:3]) N2 = prod(ps[2:]) e = 0x10001 with open("flag.txt", "rb") as f: flag = bytes_to_long(f.read()) c1 = pow(flag, e, N1) c2 = pow(flag, e, N2) with open("output.txt", "w") as f: f.write(f"{N1 = }\n") f.write(f"{N2 = }\n") f.write(f"{c1 = }\n") f.write(f"{c2 = }\n")
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/Enigma/more_hidden.py
ctfs/ImaginaryCTF/2021/crypto/Enigma/more_hidden.py
from random import randint with open('flag.txt', 'r') as f: flag = f.read() out = open('output.txt', 'a') def caesar_encrypt(flag, key): enc_flag = '' for i in range(len(flag)): if ord(flag[i]) < 65 or ord(flag[i]) > 90: enc_flag += flag[i] else: enc_flag += chr((((ord(flag[i]) - 65) + key[i]) % 26) + 65) return(enc_flag) for i in range(10000): # i wonder why it loops so much key = [] for i in range(len(flag)): key.append(randint(1,25)) # ha ha ha, its fully random. you cant decrypt this ;) out.write(caesar_encrypt(flag, key) + '\n')
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/Reversing_Some_Algorithms/chall.py
ctfs/ImaginaryCTF/2021/crypto/Reversing_Some_Algorithms/chall.py
#!/usr/bin/env python3 from random import randint import sys def f(x, y): if y == 0: return 1 if y == 1: return x return (f((x*x)%n, y//2)*x**(y&1))%n def main(): flag = input("Enter flag: ") flagnum = 0 for c in flag: flagnum += ord(c) flagnum <<= 8 flagnum >>= 8 for i in range(10): x = randint(1, n) y = 68961362722072530703826419262328445180017086349352658806957754435990062474012129234730448039535183989679030261614138753325720746667025253285107284794111174874748089561956719102087279846653340064026000842296905367458452719358638073136570664555790130912243996226275941249367950489470845980351462512958938159833 if f(f(x,y), flagnum)^x: print("Nope...") exit() print("Correct!") if __name__ == "__main__": n = 8155490875222969420750576112997716887141340453460891337810920551180429703004550568193832682799084465393315521798432598139236992914963308998731811596206919*11885624125128813660680697138338961909477606594900839188851873335783752045917361484618200086764717818694945513362636671626003687354605684469203131717879923 sys.setrecursionlimit(1500) main()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/Primetime/primetime.py
ctfs/ImaginaryCTF/2021/crypto/Primetime/primetime.py
#!/usr/bin/env python3 from itertools import islice from math import gcd from random import randint ELEMENT_LEN = 16 def primes(): num = 2 while True: prime = 1 for i in range(2, num): if num%i == 0: prime = 0 if prime: yield num num += 1 class Element: def __init__(self, n): self.n = Element.reduce(n) def __str__(self): return str(self.n) def __add__(self, other): return Element(self.n*other.n) def __eq__(self, other): return self.n == other.n def __mul__(self, n): if type(n) == int: ret = Element(1) for c in "{:0128b}".format(n): ret += ret if c == '1': ret += self return ret if type(n) == Element: ret = Element(1) primelist = list(islice(primes(), ELEMENT_LEN)) for i, num in enumerate(primelist[::-1]): cnt = 0 temp = n.n while gcd(temp, num) > 1: cnt += 1 temp //= num for c in "{:08b}".format(cnt): ret += ret if c == '1': ret += self return ret @staticmethod def encode(b): assert len(b) <= ELEMENT_LEN ret = 1 for i, num in enumerate(primes()): if i >= len(b): return Element(ret) ret *= num**b[i] @staticmethod def reduce(n): if n == 0: return 0 primelist = list(islice(primes(), ELEMENT_LEN)) for i, num in enumerate(primelist): while n % (num**256) == 0: n //= num**256 if num != primelist[-1]: n *= primelist[i+1] return n if __name__ == '__main__': gen = Element.encode(b"+h3_g3n3ra+0r_pt") akey = randint(1, 2**128)|1 bkey = randint(1, 2**128)|1 apub = gen*akey bpub = gen*bkey s = gen*akey*bkey flag = open("flag.txt").read() flag = flag.replace("ictf{", "").replace("}", "").encode() assert len(flag) == ELEMENT_LEN m = Element.encode(flag) ct = m*s print("gen =", gen) print("apub =", apub) print("bpub =", bpub) print("ct =", ct)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/web/Super_Quantum_League/superquantumleague.py
ctfs/ImaginaryCTF/2021/web/Super_Quantum_League/superquantumleague.py
from flask import Flask, render_template, request from random import choice import sqlite3 from sqlite3 import Error web_site = Flask(__name__) @web_site.route('/') def index(): return render_template('index.html') @web_site.route('/user') def user(): try: username = request.args.get('username') password = request.args.get('password') conn = sqlite3.connect("database.db") c = conn.cursor() c.execute(f"SELECT * FROM users WHERE username='{username}' AND password='{password}'") resp = c.fetchone() if resp != None: return "Welcome, admin. You logged in. The flag is not ictf{fake_flag}." else: return "You didn't log in. Sad." except: return "You didn't log in. Sad." web_site.run(host='0.0.0.0', port=6969)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/web/Build-A-Website/app.py
ctfs/ImaginaryCTF/2021/web/Build-A-Website/app.py
#!/usr/bin/env python3 from flask import Flask, render_template_string, request, redirect, url_for from base64 import b64encode, b64decode app = Flask(__name__) @app.route('/') def index(): # i dont remember how to return a string in flask so # here goes nothing :rooNervous: return render_template_string(open('templates/index.html').read()) @app.route('/backend') def backend(): website_b64 = b64encode(request.args['content'].encode()) return redirect(url_for('site', content=website_b64)) @app.route('/site') def site(): content = b64decode(request.args['content']).decode() #prevent xss blacklist = ['script', 'iframe', 'cookie', 'document', "las", "bas", "bal", ":roocursion:"] # no roocursion allowed for word in blacklist: if word in content: # this should scare them away content = "*** stack smashing detected ***: python3 terminated" csp = '''<head>\n<meta http-equiv="Content-Security-Policy" content="default-src 'none'">\n</head>\n''' return render_template_string(csp + content)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/web/Sinking_Calculator/app.py
ctfs/ImaginaryCTF/2021/web/Sinking_Calculator/app.py
#!/usr/bin/env python3 from flask import Flask, render_template_string, request app = Flask(__name__) @app.route('/') def index(): return open('templates/index.html').read() @app.route('/calc') def calc(): query = request.args['query'] request.args = {} request.headers = {} # no outside help! request.cookies = {} if len(query) > 80: # my exploit is 77 chars, but 80 is such a nice even number return "Too long!" res = render_template_string("{{%s}}"%query) out = '' for c in res: if c in "0123456789-": # negative numbers are cool out += c return out
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/web/Awkward_Bypass/app.py
ctfs/ImaginaryCTF/2021/web/Awkward_Bypass/app.py
import re import sqlite3 from flask import Flask, render_template, url_for, request, redirect, make_response app = Flask(__name__) blacklist = ["ABORT", "ACTION", "ADD", "AFTER", "ALL", "ALTER", "ALWAYS", "ANALYZE", "AND", "AS", "ASC", "ATTACH", "AUTOINCREMENT", "BEFORE", "BEGIN", "BETWEEN", "CASCADE", "CASE", "CAST", "CHECK", "COLLATE", "COLUMN", "COMMIT", "CONFLICT", "CONSTRAINT", "CREATE", "CROSS", "CURRENT", "CURRENT_DATE", "CURRENT_TIME", "CURRENT_TIMESTAMP", "DATABASE", "DEFAULT", "DEFERRABLE", "DEFERRED", "DELETE", "DESC", "DETACH", "DISTINCT", "DO", "DROP", "EACH", "ELSE", "END", "ESCAPE", "EXCEPT", "EXCLUDE", "EXCLUSIVE", "EXISTS", "EXPLAIN", "FAIL", "FILTER", "FIRST", "FOLLOWING", "FOR", "FOREIGN", "FROM", "FULL", "GENERATED", "GLOB", "GROUP", "GROUPS", "HAVING", "IF", "IGNORE", "IMMEDIATE", "IN", "INDEX", "INDEXED", "INITIALLY", "INNER", "INSERT", "INSTEAD", "INTERSECT", "INTO", "IS", "ISNULL", "JOIN", "KEY", "LAST", "LEFT", "LIKE", "LIMIT", "MATCH", "MATERIALIZED", "NATURAL", "NO", "NOT", "NOTHING", "NOTNULL", "NULL", "NULLS", "OF", "OFFSET", "ON", "OR", "ORDER", "OTHERS", "OUTER", "OVER", "PARTITION", "PLAN", "PRAGMA", "PRECEDING", "PRIMARY", "QUERY", "RAISE", "RANGE", "RECURSIVE", "REFERENCES", "REGEXP", "REINDEX", "RELEASE", "RENAME", "REPLACE", "RESTRICT", "RETURNING", "RIGHT", "ROLLBACK", "ROW", "ROWS", "SAVEPOINT", "SELECT", "SET", "TABLE", "TEMP", "TEMPORARY", "THEN", "TIES", "TO", "TRANSACTION", "TRIGGER", "UNBOUNDED", "UNION", "UNIQUE", "UPDATE", "USING", "VACUUM", "VALUES", "VIEW", "VIRTUAL", "WHEN", "WHERE", "WINDOW", "WITH", "WITHOUT"] def checkCreds(username, password): con = sqlite3.connect('database.db') cur = con.cursor() for n in blacklist: regex = re.compile(n, re.IGNORECASE) username = regex.sub("", username) for n in blacklist: regex = re.compile(n, re.IGNORECASE) password = regex.sub("", password) print(f"SELECT * FROM users WHERE username='{username}' AND password='{password}'") try: content = cur.execute(f"SELECT * FROM users WHERE username='{username}' AND password='{password}'").fetchall() except: return False cur.close() con.close() if content == []: return False else: return True @app.route('/') def index(): return render_template("index.html") @app.route('/user', methods=['POST']) def user(): if request.method == 'POST': username = request.values['username'] password = request.values['password'] if checkCreds(username, password) == True: return render_template("user.html") else: return "Error" else: return render_template("user.html")
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/web/SaaS/app.py
ctfs/ImaginaryCTF/2021/web/SaaS/app.py
from flask import Flask, render_template, request import html import os app = Flask(__name__) @app.route('/') def index(): return render_template('index.html') blacklist = ["flag", "cat", "|", "&", ";", "`", "$"] @app.route('/backend') def backend(): for word in blacklist: if word in request.args['query']: return "Stop hacking.\n" return html.escape(os.popen(f"sed {request.args['query']} stuff.txt").read())
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/web/aMAZEing-challenge/client.py
ctfs/ImaginaryCTF/2021/web/aMAZEing-challenge/client.py
import json import requests from os import system from pprint import pprint from maze import Maze from cookie_decoder import cookie_decode API = "http://127.0.0.1:9001" # IMPORTANT: # This is just a template, you can change it or create your own client to talk to the server. # It's almost impossible to get the flag with the script (in unmodified form), but you can give it a try. def parse_session(data): data = data["session"] data = cookie_decode(data).decode() return json.loads(data) def get_new_maze(s): res = s.get(f"{API}/") # init maze session = s.cookies data = parse_session(session) maze = Maze(data=data["maze"]) return maze def send_steps(s, directions): res = s.get(f"{API}/step?directions={directions}").text # send direction, only update local maze return res if __name__ == "__main__": s = requests.Session() maze = get_new_maze(s) system("clear") print(maze) print("Hello there and welcome to my aMAZEing challenge!") print("The flag is marked on the maze, just navigate to it and I'll give it to you.") input("Enter [s] for down, [w] for up, [a] for left or [d] for right to walk in the maze. Enter any key to start.\n") system("clear") print(maze) while True: directions = input("> ") res = send_steps(s, directions) for d in list(directions): maze.step(d) system("clear") print(maze) if maze.get_player_pos() == maze.get_flag_pos(): print(res) break
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/web/aMAZEing-challenge/cookie_decoder.py
ctfs/ImaginaryCTF/2021/web/aMAZEing-challenge/cookie_decoder.py
""" Flask Session Cookie Decoder/Encoder """ __author__ = 'Wilson Sumanang, Alexandre ZANNI' # https://github.com/noraj/flask-session-cookie-manager/blob/master/flask_session_cookie_manager3.py # standard imports import sys import zlib from itsdangerous import base64_decode import ast # external Imports from flask.sessions import SecureCookieSessionInterface def cookie_decode(session_cookie_value, secret_key=None): """ Decode a Flask cookie """ try: if(secret_key==None): compressed = False payload = session_cookie_value if payload.startswith('.'): compressed = True payload = payload[1:] data = payload.split(".")[0] data = base64_decode(data) if compressed: data = zlib.decompress(data) return data else: app = MockApp(secret_key) si = SecureCookieSessionInterface() s = si.get_signing_serializer(app) return s.loads(session_cookie_value) except Exception as e: return "[Decoding error] {}".format(e) raise e
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/web/aMAZEing-challenge/server.py
ctfs/ImaginaryCTF/2021/web/aMAZEing-challenge/server.py
import random from time import time from base64 import b64encode from flask import Flask, session, request, make_response from maze import Maze from solver import solve from random import choice def gen_sec_key(): return "]!74hc_51ht_3vl0s_yltn4tsn1_ot_no155e5_wen_a_3ta3rc_tn4c_u0y_3rus_m4_I[ftci"[::-1] def is_prime(x): return all(x % i for i in range(2, x)) def get_primes_between(l, u): return [a for a in range(l, u) if is_prime(a)] def random_prime(l, u): return random.choice(get_primes_between(l, u)) def delete_session(): for key in list(session.keys()): session.pop(key) def parse_directions(directions): # do some super important checks, so the player can't do the "jump through walls" glitch if len(directions) == 3: if 3 * ord(directions[0]) - 2 * ord(directions[1]) + 1 * ord(directions[2]) == 282: if 4 * ord(directions[0]) - 3 * ord(directions[1]) + 2 * ord(directions[2]) == 423: if 1 * ord(directions[0]) - 4 * ord(directions[1]) + 3 * ord(directions[2]) == 88: # GLITCH DETECTED, ABORT IMMEDIATELY delete_session() raise Exception("How dare you trying to cheat? Your session was deleted, you brought this to yourself!") return list(directions) app = Flask(__name__) app.config['SECRET_KEY'] = gen_sec_key() # https://blog.miguelgrinberg.com/post/how-secure-is-the-flask-user-session # -> everyone can read the content of the session cookie, but not change it (if the secret is secure) FLAG = open("flag.txt", "r").read() """ p1 = random_prime(50, 100) p2 = random_prime(50, 100) flag_enc = [0x1337] for i in range(len(FLAG)): flag_enc.append((flag_enc[-1] + ord(FLAG[i])) * p1 * p2) """ flag_enc = open("flag.txt.enc", "r").read() @app.route('/') def init(): delete_session() maze = Maze() session["maze"] = str(maze) session["tries"] = 0 return make_response(f"Successfully initialized a new maze. It is stored in your session cookie.") @app.route('/step') def step(): # check if session still alive for k in ["maze", "tries"]: if k not in session.keys(): return make_response("Session died! Please send a GET request to '/' to get a new and valid session!") # directions check if not request.args.get('directions'): return make_response("No direction(s) specified!") else: directions = parse_directions(request.args.get('directions')) maze = Maze(data=session["maze"]) for d in directions: if d not in maze.get_actions(): continue # is valid, do step maze.step(d) # all done, update maze in session session["maze"] = str(maze) session["tries"] += 1 if maze.get_player_pos() == maze.get_flag_pos(): tries = session["tries"] delete_session() if tries > 1: return make_response("You interacted multiple times with the '/step' endpoint. So you just get a super secure encrypted flag. Next time, try implementing Dijkstra's algorithm to solve the maze in one go, or try decrypting the flag:\n" + flag_enc) return make_response(FLAG) return make_response(f"New pos: {maze.get_player_pos()}") @app.errorhandler(404) def not_found(e): return "Invalid url! Only '/step' and '/' are allowed." @app.errorhandler(500) def error(e): return "Unexpected error occured! \nAnyways, here is your encripted flag for crashing it: " + flag_enc if __name__ == "__main__": app.run(host='127.0.0.1', port=9001)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/web/aMAZEing-challenge/maze.py
ctfs/ImaginaryCTF/2021/web/aMAZEing-challenge/maze.py
import random from os import system from time import sleep from solver import solve START_POS = (1, 1) MIN_STEPS = 2 WALL = "โ–“โ–“" NEWLINE = "\n" CLEAR = " " FLAG = "{}" PLAYER = "[]" WALL_ALT = "##" NEWLINE_ALT = "n" UP, LEFT, DOWN, RIGHT = "w", "a", "s", "d" class Maze: def __init__(self, size=(79,39), data=None, verbose=False): self._player_pos = START_POS self._flag_at = (-1, -1) self._maze = [[Node(-1, -1)]] if data is None: min_steps = (size[0] + size[1]) // 3 * 2 # make sure the flag is far from the start pos self.gen_maze(size, min_steps, verbose) else: self.parse_maze(data) def gen_maze(self, size, min_steps, verbose): # init all nodes as walls self._maze = [] for i in range(size[1]): line = [] for j in range(size[0]): line.append(Node((i, j))) self._maze.append(line) def calc_new_frontier_cells(pos, passage, frontier): i, j = pos # add new frontiers for given pos if i > 2 and (i - 2, j) not in passage and (i - 2, j) not in frontier: frontier.append((i - 2, j)) if j > 2 and (i, j - 2) not in passage and (i, j - 2) not in frontier: frontier.append((i, j - 2)) if i < size[1] - 3 and (i + 2, j) not in passage and (i + 2, j) not in frontier: frontier.append((i + 2, j)) if j < size[0] - 3 and (i, j + 2) not in passage and (i, j + 2) not in frontier: frontier.append((i, j + 2)) def get_between_cell(pos, passage): valid_neighbours = [] i, j = pos for c in passage: if c in [(i - 2, j), (i, j - 2), (i + 2, j), (i, j + 2)]: # cell is a neighbour of pos valid_neighbours.append(c) if len(valid_neighbours) == 0: return valid_neighbours ni, nj = random.choice(valid_neighbours) between_cell = ((i + ni) // 2, (j + nj) // 2) # avg of coords== between cell coords return between_cell def get_node_from_pos(pos): return self._maze[pos[0]][pos[1]] # init start pos as passage start_cell = get_node_from_pos(START_POS) start_cell.clear_wall() # init frontier algo, add start_pos to passage and frontier = [] passage = [START_POS] frontier = [] calc_new_frontier_cells(START_POS, passage, frontier) # create the maze with the prim's algorithm while len(frontier) > 0: if verbose: # Just overwrite all previous data with this big a** string system("clear") print(self.__str__()) sleep(0.01) # choose a random frontier cell cell_pos = random.choice(frontier) between_cell_pos = get_between_cell(cell_pos, passage) frontier.remove(cell_pos) cell = get_node_from_pos(cell_pos) cell.clear_wall() between_cell = get_node_from_pos(between_cell_pos) between_cell.clear_wall() # between cells are not valid next cells, only the cell variables! passage.append(cell_pos) # now add the new frontier cells calc_new_frontier_cells(cell_pos, passage, frontier) # assert that flag pos is far away from player, throws error if no path found from flag to player while True: self._flag_at = random.choice(passage) way = solve(self) if verbose: system("clear") print(self.__str__()) sleep(0.5) if len(way) >= min_steps: # maze generated and flag is far enough from the player -> done if verbose: print("There is no such thing as an polynomial runtime algorihtm for finding the shortest path between two points. Or is there?") print("CiMgc2VhcmNoIGNsb3Nlc3QgcGF0aCB0byBmbGFnCmRlZiBzb2x2ZShtYXplKToKICAgICMgcmVzZXQgYWxsZSBub2RlIGRpc3RhbmNlcyBhbmQgcHJldiBub2RlcwogICAgbWF6ZS5yZXNldF9zb2x2ZSgpCgogICAgIyBpbml0CiAgICBzdGFydF9ub2RlID0gbWF6ZS5nZXRfcGxheWVyX25vZGUoKQogICAgc3RhcnRfbm9kZS5zZXRfZGlzdCgwKQogICAgdGFyZ2V0ID0gbWF6ZS5nZXRfZmxhZ19ub2RlKCkKCiAgICB2aXNpdGVkID0gW10KICAgIG5leHRfbm9kZXMgPSBbc3RhcnRfbm9kZV0KCiAgICB3aGlsZSB0YXJnZXQgbm90IGluIHZpc2l0ZWQ6CiAgICAgICAgIyBjdXJyZW50IG5vZGUgaXMgYWx3YXlzIHRoZSBvbmUgd2l0aCB0aGUgc2hvcnRlc3QgZGlzdCB0byBzdGFydAogICAgICAgIGN1cnJlbnRfbm9kZSA9IG5leHRfbm9kZXMucG9wKDApCgogICAgICAgIG5laWdoYm91cnMgPSBtYXplLmdldF9hY3Rpb25zKG9ubHlfZGlyZWN0aW9ucz1GYWxzZSwgcG9zPWN1cnJlbnRfbm9kZS5nZXRfcG9zKCkpCiAgICAgICAgZm9yIGRpcmVjdGlvbiwgbmVpZ2hib3VyIGluIG5laWdoYm91cnM6CgogICAgICAgICAgICAjIGNoZWNrIGlmIHRoZSBuZXcgd2F5IGlzIHNob3J0ZXIKICAgICAgICAgICAgbmV3X2Rpc3QgPSBjdXJyZW50X25vZGUuZ2V0X2Rpc3QoKSArIDEKCiAgICAgICAgICAgIGlmIG5ld19kaXN0IDwgbmVpZ2hib3VyLmdldF9kaXN0KCk6CiAgICAgICAgICAgICAgICBuZWlnaGJvdXIuc2V0X2Rpc3QobmV3X2Rpc3QpCiAgICAgICAgICAgICAgICBuZWlnaGJvdXIuc2V0X3ByZXYoZGlyZWN0aW9uLCBjdXJyZW50X25vZGUpCiAgICAgICAgICAgICAgICBuZXh0X25vZGVzLmFwcGVuZChuZWlnaGJvdXIpCgogICAgICAgIGlmIGN1cnJlbnRfbm9kZSA9PSB0YXJnZXQ6CiAgICAgICAgICAgIHByaW50KCkKCiAgICAgICAgdmlzaXRlZC5hcHBlbmQoY3VycmVudF9ub2RlKSAgIyBub3cgYWxsIG5laWdoYm91cnMgYXJlIHZpc2l0ZWQsIG5vIG1vcmUgY2hhbmdlcyB0byBjdXJyZW50IG5vZGUKICAgICAgICBuZXh0X25vZGVzID0gc29ydGVkKG5leHRfbm9kZXMsIGtleT1sYW1iZGEgbjogbi5nZXRfZGlzdCgpKQoKICAgICMgYmFja3RyYWNrIGRpcmVjdGlvbnMKICAgIHdheSA9ICIiCiAgICBub2RlID0gbWF6ZS5nZXRfZmxhZ19ub2RlKCkKICAgIHdoaWxlIG5vZGUgaXMgbm90IHN0YXJ0X25vZGU6CiAgICAgICAgZCwgbm9kZSA9IG5vZGUuZ2V0X3ByZXYoKQogICAgICAgIHdheSArPSBkCgogICAgcmV0dXJuIHdheVs6Oi0xXQoKCmlmIF9fbmFtZV9fID09ICJfX21haW5fXyI6CiAgICBmcm9tIG1hemUgaW1wb3J0IE1hemUKCiAgICBtID0gTWF6ZSh2ZXJib3NlPUZhbHNlKQogICAgZGlyZWN0aW9ucyA9IHNvbHZlKG0pCgogICAgbS5zaG93X3NvbHZlKGRpcmVjdGlvbnMpCiAgICBwcmludChkaXJlY3Rpb25zKQ==") break def parse_maze(self, string): if NEWLINE in string: raw_maze = string.split(NEWLINE)[:-1] else: raw_maze = string.split(NEWLINE_ALT)[:-1] self._maze = [] for i in range(len(raw_maze)): line = [] for j in range(0, len(raw_maze[i]), 2): # maze chars are 2 wide is_wall = raw_maze[i][j:j+2] in [WALL, WALL_ALT] if raw_maze[i][j:j+2] == PLAYER: self._player_pos = (i, j//2) if raw_maze[i][j:j+2] == FLAG: self._flag_at = (i, j//2) n = Node((i, j//2), is_wall) line.append(n) self._maze.append(line) def __str__(self): s = "" if not hasattr(self, "_flag_at"): self._flag_at = (-1, -1) if not hasattr(self, "_player_pos"): self._player_pos = (-1, -1) for i in range(len(self._maze)): for j in range(len(self._maze[i])): if self._player_pos == (i, j): # show player over flag s += PLAYER elif self._flag_at == (i, j): s += FLAG else: s += self._maze[i][j].render() # from class node s += NEWLINE return s def ascii_render(self): s = str(self) return s.replace(WALL, WALL_ALT).replace(NEWLINE, NEWLINE_ALT) def get_player_pos(self): return self._player_pos def get_player_node(self): i, j = self._player_pos return self._maze[i][j] def get_flag_pos(self): return self._flag_at def get_flag_node(self): i, j = self._flag_at return self._maze[i][j] def get_actions(self, only_directions=True, pos=None): if pos is None: i, j = self._player_pos else: i, j = pos actions = "" nodes = [] if not self._maze[i - 1][j].is_wall(): actions += UP nodes.append(self._maze[i - 1][j]) if not self._maze[i + 1][j].is_wall(): actions += DOWN nodes.append(self._maze[i + 1][j]) if not self._maze[i][j - 1].is_wall(): actions += LEFT nodes.append(self._maze[i][j - 1]) if not self._maze[i][j + 1].is_wall(): actions += RIGHT nodes.append(self._maze[i][j + 1]) if only_directions: return actions return zip(list(actions), nodes) def step(self, direction): if direction not in self.get_actions(): return i, j = self._player_pos if direction == UP: self._player_pos = (i - 1, j) if direction == DOWN: self._player_pos = (i + 1, j) if direction == LEFT: self._player_pos = (i, j - 1) if direction == RIGHT: self._player_pos = (i, j + 1) def show_solve(self, way_to_flag): for direction in way_to_flag: system("clear") self.step(direction) print(self.__str__()) sleep(0.1) def reset_solve(self): for line in self._maze: for node in line: node.reset() class Node: def __init__(self, pos, is_wall=True): self._pos = pos self._is_wall = is_wall self._prev = "", None # direction from prev_node to this node, prev_node self._dist = 2 ** 32 # Inf def get_pos(self): return self._pos def is_wall(self): return self._is_wall def clear_wall(self): self._is_wall = False def set_prev(self, direction, node): self._prev = (direction, node) def get_prev(self): return self._prev def set_dist(self, dist): self._dist = dist def get_dist(self): return self._dist def reset(self): self._prev = "", None self._dist = 2 ** 32 def render(self): if self.is_wall(): return WALL return CLEAR def __str__(self): return f"{self._pos} {self._dist}" if __name__ == "__main__": from sys import argv m = Maze(verbose=True) m.step(m.get_actions()[0])
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/web/Cookie_Stream/app.py
ctfs/ImaginaryCTF/2021/web/Cookie_Stream/app.py
from flask import Flask, render_template, request, make_response, redirect from Crypto.Cipher import AES from Crypto.Util.Padding import pad, unpad from binascii import hexlify, unhexlify from os import urandom from random import randint from hashlib import sha512 app = Flask(__name__) key = urandom(16) cnonce = urandom(8) users = { 'admin' : '240964a7a2f1b057b898ef33c187f2c2412aa4d849ac1a920774fd317000d33ebb8b0064834ed1f8a74763df4e95cd8c8be3a154b46929c3969ce323db69b81f', 'ImaginaryCTFUser' : '87197acc4657e9adcc2e4e24c77268fa5b95dea2867eacd493a0478a0c493420bfb2280c7e4e579a604e0a243f74a36a8931edf71b088add09537e54b11ce326', 'Eth007' : '444c67bb7d9d56580e0a2fd1ad00c535e465fc3ca9558e8333512fe65ff971a3dfb6b08f48ea4f91f8e8b55887ec3f0d7634a8df98e636a4134628c95a8f0ebf', 'just_a_normal_user' : 'b109f3bbbc244eb82441917ed06d618b9008dd09b3befd1b5e07394c706a8bb980b1d7785e5976ec049b46df5f1326af5a2ea6d103fd07c95385ffab0cacbc86', 'firepwny' : '6adee5baa5ad468ac371d40771cf2e83e3033f91076f158d2c8d5d7be299adfce15247067740edd428ef596006d6eaa843b36cc109618e0a1cae843b6eed5c29', ':roocursion:' : '7f5310d2675c09c1b274f7642bf4979b2ce642515551a7617d155033e77ecfd53dede33ee541adde2f1072739696d0138d1b2f90c9ecc596095fa43b759e9baa', } def check(username, password): if username not in users.keys(): return False if sha512(password.encode()).hexdigest() == users[username]: return True @app.route('/') def index(): return render_template('login.html') @app.route('/backend', methods=['GET', 'POST']) def backend(): if request.method == 'POST': if not check(request.form['username'], request.form['password']): return 'Wrong username/password.' resp = make_response(redirect('/home')) nonce = urandom(8) cipher = AES.new(key, AES.MODE_CTR, nonce=nonce) # my friend told me that cbc had some weird bit flipping attack? ctr sounds way cooler anyways cookie = hexlify(nonce + cipher.encrypt(pad(request.form['username'].encode(), 16))) resp.set_cookie('auth', cookie) return resp else: return make_response(redirect('/home')) @app.route('/home', methods=['GET']) def home(): nonce = unhexlify(request.cookies.get('auth')[:16]) cipher = AES.new(key, AES.MODE_CTR, nonce=nonce) username = unpad(cipher.decrypt(unhexlify(request.cookies.get('auth')[16:])), 16).decode() if username == 'admin': flag = open('flag.txt').read() return render_template('fun.html', username=username, message=f'Your flag: {flag}') else: return render_template('fun.html', username=username, message='Only the admin user can view the flag.') @app.errorhandler(Exception) def handle_error(e): return redirect('/')
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2024/misc/gdbjail1_492_pts/main.py
ctfs/ImaginaryCTF/2024/misc/gdbjail1_492_pts/main.py
import gdb def main(): gdb.execute("file /bin/cat") gdb.execute("break read") gdb.execute("run") while True: try: command = input("(gdb) ") if command.strip().startswith("break") or command.strip().startswith("set") or command.strip().startswith("continue"): try: gdb.execute(command) except gdb.error as e: print(f"Error executing command '{command}': {e}") else: print("Only 'break', 'set', and 'continue' commands are allowed.") except: pass if __name__ == "__main__": main()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2024/misc/Left_in_the_Dark/maze.py
ctfs/ImaginaryCTF/2024/misc/Left_in_the_Dark/maze.py
#!/usr/bin/env python3 from random import choice from copy import deepcopy # https://pypi.org/project/console/ from console.utils import wait_key class Maze: def __init__(self, dim, size): self.dim = dim self.size = size self.maze = '#' self.loc = tuple([0]*dim) for i in range(dim): self.maze = [deepcopy(self.maze) for _ in range(size)] self.gen() def __str__(self): if type(self.maze[0]) == str: return ''.join(self.maze)+'\n' ret = '' for i in self.maze: temp = deepcopy(self) temp.dim -= 1 temp.maze = i ret += str(temp) ret += "\n" return ret @staticmethod def fromstr(s): dim = 0 for i in s[-max(len(s), 50):][::-1]: if i == '\n': dim += 1 else: break size = 0 for i in s[:max(len(s), 50):]: if i == '\n': break size += 1 ret = Maze(2, 2) ret.maze = Maze.fromstrhelp(s, dim, size) ret.dim = dim ret.size = size ret.loc = tuple([0]*dim) return ret @staticmethod def fromstrhelp(s, dim, size): s = s.strip() if dim == 1: return list(s) return [Maze.fromstrhelp(i+'\n'*(dim-1), dim-1, size) for i in s.split('\n'*(dim-1))] def get(self, *pt): ret = self.maze for idx in pt: ret = ret[idx] return ret def set(self, *pt, **kwargs): temp = self.maze for idx in pt[:-1]: temp = temp[idx] temp[pt[-1]] = kwargs['val'] def check(self, *pt): for i in pt: if i >=self.size or i < 0: return False return True def adj(self, *pt): ret = set() for i in range(len(pt)): newpt = [i for i in pt] newpt[i] += 1 if self.check(*newpt): ret = ret | {tuple(newpt)} newpt[i] -= 2 if self.check(*newpt): ret = ret | {tuple(newpt)} return ret def neighbors(self, *pt, typ=None): ret = set() for pt in self.adj(*pt): if typ is None or self.get(*pt) in typ: ret = ret | {pt} return ret def gen(self): self.set(*self.loc, val=' ') walls = self.adj(*self.loc) while len(walls) > 0: rand = choice(list(walls)) nbhd = self.neighbors(*rand, typ=' ') if len(nbhd) == 1: self.set(*rand, val=' ') walls = walls | self.neighbors(*rand, typ='#') walls = walls - {rand} self.set(*([0]*self.dim), val='@') for i in self.neighbors(*([0]*self.dim)): self.set(*i, val=' ') self.set(*([self.size-1]*self.dim), val='F') for i in self.neighbors(*([self.size-1]*self.dim)): self.set(*i, val=' ') def move(self, mv): newLoc = (self.loc[0] + mv[0], self.loc[1] + mv[1]) if ( newLoc[0] < 0 or newLoc[0] >= self.size or newLoc[1] < 0 or newLoc[1] >= self.size or self.get(*newLoc) == '#' ): print("BONK") return if self.get(*newLoc) == 'F': print(open("flag.txt").read()) wait_key() exit(0) self.set(*self.loc, val=' ') self.set(*newLoc, val='@') self.loc = newLoc def getKey(): key = wait_key() if key == chr(3): # Ctrl-C exit(1) return key moveDict = { 'w': (-1, 0), 's': (1, 0), 'd': (0, 1), 'a': (0, -1), } def waitForMove(): key = None while key not in moveDict: key = getKey() return moveDict[key] def main(): maze = Maze(2, 40) print("Find the flag in this maze. Good luck!") print("WASD to move.") while True: # print(maze) move = waitForMove() maze.move(move) if __name__ == '__main__': main()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2024/misc/ok_nice/jail.py
ctfs/ImaginaryCTF/2024/misc/ok_nice/jail.py
#!/usr/bin/env python3 flag = open('flag.txt').read() print("Welcome to the jail! It is so secure I even have a flag variable!") blacklist=['0','1','2','3','4','5','6','7','8','9','_','.','=','>','<','{','}','class','global','var','local','import','exec','eval','t','set','blacklist'] while True: inp = input("Enter input: ") for i in blacklist: if i in inp: print("ok nice") exit(0) for i in inp: if (ord(i) > 125) or (ord(i) < 40) or (len(set(inp))>17): print("ok nice") exit(0) try: eval(inp,{'__builtins__':None,'ord':ord,'flag':flag}) print("ok nice") except: print("error")
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2024/misc/starship/main.py
ctfs/ImaginaryCTF/2024/misc/starship/main.py
#!/usr/bin/env python3 import pandas as pd from io import StringIO from sklearn.neighbors import KNeighborsClassifier from gen import gen_data done = False flag = open("flag.txt").read().strip() def menu(): print("1. show dataset") print("2. train model") print("3. predict state") print("4. check incoming objects") def train_dataset(dataset): df = pd.read_csv(StringIO(dataset)) X, y = df.iloc[:, :-1].values, df.iloc[:, -1].values model = KNeighborsClassifier(n_neighbors=3) model.fit(X, y) return model if __name__ == "__main__": print("<[ missle defense system control panel ]>") menu() print("initializing...") while True: dataset, incoming = gen_data() model = train_dataset(dataset) pred1 = model.predict([list(map(int, incoming[0].split(",")))]) pred2 = model.predict([list(map(int, incoming[1].split(",")))]) if pred1[0] == "enemy" and pred2[0] == "enemy": break while True: choice = int(input("> ")) if choice == 1: print("--- BEGIN DATASET ---") print(dataset) print("--- END DATASET ---") if choice == 2: model = train_dataset(dataset) print("model trained!") if choice == 3: inp = input("enter data: ") pred = model.predict([list(map(int, inp.split(",")))]) print(f"result: {pred}") if choice == 4: pred1 = model.predict([list(map(int, incoming[0].split(",")))]) pred2 = model.predict([list(map(int, incoming[1].split(",")))]) print(f"target 1: {incoming[0]} | result: {pred1[0]}") print(f"target 2: {incoming[1]} | result: {pred2[0]}") if pred1[0] == "friendly" and pred2[0] == "friendly": print(f"flag: {flag}") if choice == 42 and not done: inp = input("enter data: ") inp = inp.split(",") for i in range(9): inp[i] = int(inp[i]) if len(inp) == 10: dataset = dataset.strip() + "\n" + ",".join(map(str,inp)) done = True
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2024/misc/gdbjail2/main.py
ctfs/ImaginaryCTF/2024/misc/gdbjail2/main.py
import gdb blacklist = ["p", "-", "&", "(", ")", "[", "]", "{", "}", "0x"] def main(): gdb.execute("file /bin/cat") gdb.execute("break read") gdb.execute("run") while True: try: command = input("(gdb) ") if any([word in command for word in blacklist]): print("Banned word detected!") continue if command.strip().startswith("break") or command.strip().startswith("set") or command.strip().startswith("continue"): try: gdb.execute(command) except gdb.error as e: print(f"Error executing command '{command}': {e}") else: print("Only 'break', 'set', and 'continue' commands are allowed.") except: pass if __name__ == "__main__": main()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2024/misc/gdbjail1/main.py
ctfs/ImaginaryCTF/2024/misc/gdbjail1/main.py
import gdb def main(): gdb.execute("file /bin/cat") gdb.execute("break read") gdb.execute("run") while True: try: command = input("(gdb) ") if command.strip().startswith("break") or command.strip().startswith("set") or command.strip().startswith("continue"): try: gdb.execute(command) except gdb.error as e: print(f"Error executing command '{command}': {e}") else: print("Only 'break', 'set', and 'continue' commands are allowed.") except: pass if __name__ == "__main__": main()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2024/misc/calc/server.py
ctfs/ImaginaryCTF/2024/misc/calc/server.py
#!/usr/bin/env python3 from sys import addaudithook from os import _exit from re import match def safe_eval(exit, code): def hook(*a): exit(0) def dummy(): pass dummy.__code__ = compile(code, "<code>", "eval") addaudithook(hook) return dummy() if __name__ == "__main__": expr = input("Math expression: ") if len(expr) <= 200 and match(r"[0-9+\-*/]+", expr): print(safe_eval(_exit, expr)) else: print("Do you know what is a calculator?")
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2024/rev/vokram/vm.py
ctfs/ImaginaryCTF/2024/rev/vokram/vm.py
#!/usr/bin/env python3 def vokram(text, program): while True: for pat, repl, stop in program: if pat in text: text = text.replace(pat, repl, 1) if stop: return text break else: return text def parse(source): program = [] for line in source.strip().splitlines(): pat, repl = line.split(":", 1) stop = False if len(repl) > 0 and repl[0] == ":": repl = repl[1:] stop = True if ":" in repl: raise ValueError("invalid rule: %r" % line) program.append((pat, repl, stop)) return program if __name__ == "__main__": import sys source_file = sys.argv[1] input_str = sys.argv[2] with open(source_file) as f: program = parse(f.read()) print(vokram(input_str, program))
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2024/crypto/solitude/main.py
ctfs/ImaginaryCTF/2024/crypto/solitude/main.py
#!/usr/bin/env python3 import random def xor(a: bytes, b: bytes): out = [] for m,n in zip(a,b): out.append(m^n) return bytes(out) class RNG(): def __init__(self, size, state=None): self.size = size self.state = list(range(self.size+2)) random.shuffle(self.state) def next(self): idx = self.state.index(self.size) self.state.pop(idx) self.state.insert((idx+1) % (len(self.state)+1), self.size) if self.state[0] == self.size: self.state.pop(0) self.state.insert(1, self.size) idx = self.state.index(self.size+1) self.state.pop(idx) self.state.insert((idx+1) % (len(self.state)+1), self.size+1) if self.state[0] == self.size+1: self.state.pop(0) self.state.insert(1, self.size+1) if self.state[1] == self.size+1: self.state.pop(1) self.state.insert(2, self.size+1) c1 = self.state.index(self.size) c2 = self.state.index(self.size+1) self.state = self.state[max(c1,c2)+1:] + [self.size if c1<c2 else self.size+1] + self.state[min(c1,c2)+1:max(c1,c2)] + [self.size if c1>c2 else self.size+1] + self.state[:min(c1,c2)] count = self.state[-1] if count in [self.size,self.size+1]: count = self.size self.state = self.state[count:-1] + self.state[:count] + self.state[-1:] idx = self.state[0] if idx in [self.size,self.size+1]: idx = self.size out = self.state[idx] if out in [self.size,self.size+1]: out = self.next() return out if __name__ == "__main__": flag = open("flag.txt", "rb").read() while True: i = int(input("got flag? ")) for _ in range(i): rng = RNG(128) stream = bytes([rng.next() for _ in range(len(flag))]) print(xor(flag, stream).hex())
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2024/crypto/integrity/main.py
ctfs/ImaginaryCTF/2024/crypto/integrity/main.py
from Crypto.Util.number import * from binascii import crc_hqx p = getPrime(1024) q = getPrime(1024) n = p*q e = 65537 tot = (p-1)*(q-1) d = pow(e, -1, tot) flag = bytes_to_long(open("flag.txt", "rb").read()) ct = pow(flag, e, n) #signature = pow(flag, d, n) # no, im not gonna do that signature = pow(flag, crc_hqx(long_to_bytes(d), 42), n) print(f"{n = }") print(f"{ct = }") print(f"{signature = }")
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2024/crypto/notitle/chall.py
ctfs/ImaginaryCTF/2024/crypto/notitle/chall.py
from sage.all import * import os from Crypto.Cipher import AES from hashlib import sha512 proof.all(False) p = 0x7AADA0BA1C05D63803BA6BCE66CB6BC091C7ADA62B5CB5BC9F924B528FC113971D4BC54C7FAF3C146ADEB0548BFB9258DFF316741266B802DD7A2F46F77593BAD983E6DF394C1519E8DB0130289FA5A9C628E3ABCE58C63B3379DB7088AAC7A40B63776959774B1B57B8FD316C650AE3C012A91EE653477443446050438A99E79B89B69745BD1918EECB08A0C9D45EF3C61639137F24D979FF380D65C7ABD08785F1AF99729A62F3690747AEC4CCBDA99BAE6E990A0FEFF6F1AB9ABEAFE7FB5BDDB8471C607DEC16198A2AE7776C56B5B6CA24B4C0A2441A047A18EB23302B46CC49ADFF6188FC97C886D5BF67B4B0EFF56762C4E48AAD3F02E7CFE8AA157FB1789B1 F = GF(p) def magic_op(x, n): r0, r1 = 1, x for b in f"{n:b}": if b == "0": r1 = 2 * r0 * r1 - x r0 = 2 * r0**2 - 1 else: r0 = 2 * r0 * r1 - x r1 = 2 * r1**2 - 1 return r0 if __name__ == "__main__": with open("flag.txt", "rb") as f: flag = f.read().strip() h = int(sha512(flag).hexdigest(), 16) magic_pi = magic_op(F(314159), h) magic_e = magic_op(F(271828), h) key = os.urandom(16) k = F(int.from_bytes(key, "big")) fake_k = [F.random_element() for _ in range(63)] fake_k += [k - sum(fake_k)] obfuscated_keys = [magic_op(k, h) for k in fake_k] cipher = AES.new(key, AES.MODE_CTR) ct = cipher.encrypt(flag) iv = cipher.nonce print(f"{magic_pi = }") print(f"{magic_e = }") print(f"{obfuscated_keys = }") print(f"{ct = }") print(f"{iv = }")
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2024/crypto/lf3r/chall.py
ctfs/ImaginaryCTF/2024/crypto/lf3r/chall.py
import secrets, os n = 256 MASK = 0x560074275752B31E43E64E99D996BC7B5A8A3DAC8B472FE3B83E6C6DDB5A26E7 class LF3R: def __init__(self, n, key, mask): self.n = n self.state = key & ((1 << n) - 1) self.mask = mask def __call__(self): v = self.state % 3 self.state = (self.state >> 1) | ( ((self.state & self.mask).bit_count() & 1) << (self.n - 1) ) return v def int_to_base(n, b): digits = [] while n: digits.append(n % b) n //= b return digits if __name__ == "__main__": key = secrets.randbits(n) lf3r = LF3R(n, key, MASK) stream = [lf3r() for _ in range(2048)] flag = os.environ["FLAG"].encode() flag_digits = int_to_base(int.from_bytes(flag, "big"), 3) stream += [(x + lf3r()) % 3 for x in flag_digits] print(f"{stream = }")
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2024/crypto/tango/server.py
ctfs/ImaginaryCTF/2024/crypto/tango/server.py
from Crypto.Cipher import Salsa20 from Crypto.Util.number import bytes_to_long, long_to_bytes import json from secrets import token_bytes, token_hex from zlib import crc32 from secret import FLAG KEY = token_bytes(32) def encrypt_command(command): if len(command) != 3: print('Nuh uh.') return cipher = Salsa20.new(key=KEY) nonce = cipher.nonce data = json.dumps({'user': 'user', 'command': command, 'nonce': token_hex(8)}).encode('ascii') checksum = long_to_bytes(crc32(data)) ciphertext = cipher.encrypt(data) print('Your encrypted packet is:', (nonce + checksum + ciphertext).hex()) def run_command(packet): packet = bytes.fromhex(packet) nonce = packet[:8] checksum = bytes_to_long(packet[8:12]) ciphertext = packet[12:] try: cipher = Salsa20.new(key=KEY, nonce=nonce) plaintext = cipher.decrypt(ciphertext) if crc32(plaintext) != checksum: print('Invalid checksum. Aborting!') return data = json.loads(plaintext.decode('ascii')) user = data.get('user', 'anon') command = data.get('command', 'nop') if command == 'nop': print('...') elif command == 'sts': if user not in ['user', 'root']: print('o_O') return print('The server is up and running.') elif command == 'flag': if user != 'root': print('You wish :p') else: print(FLAG) else: print('Unknown command.') except (json.JSONDecodeError, UnicodeDecodeError): print('Invalid data. Aborting!') def menu(): print('[E]ncrypt a command') print('[R]un a command') print('[Q]uit') def main(): print('Welcome to the Tango server! What would you like to do?') while True: menu() option = input('> ').upper() if option == 'E': command = input('Your command: ') encrypt_command(command) elif option == 'R': packet = input('Your encrypted packet (hex): ') run_command(packet) elif option == 'Q': exit(0) else: print('Unknown option:', option) if __name__ == '__main__': main()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2024/crypto/base64/main.py
ctfs/ImaginaryCTF/2024/crypto/base64/main.py
from Crypto.Util.number import bytes_to_long q = 64 flag = open("flag.txt", "rb").read() flag_int = bytes_to_long(flag) secret_key = [] while flag_int: secret_key.append(flag_int % q) flag_int //= q print(f"{secret_key = }")
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/misc/Temu/temu.py
ctfs/ImaginaryCTF/2023/misc/Temu/temu.py
#!/usr/bin/env python3 # https://pypi.org/project/console/ from console.screen import Screen from console.utils import wait_key from console import fg from multiprocessing import Process, Manager from typing import List from dataclasses import dataclass import re @dataclass class File: name: str contents: str owner: str @dataclass class User: name: str disallowed_commands: List[str] cwd = "/home/a/" user_input = '' user_input_store = '' history = [] history_idx = 0 users = { "alice": User("alice", ["cat"]), "bob": User("bob", ["cat"]), "eve": User("eve", []), } files = { cwd+"flag.txt": File("flag.txt", open("flag.txt").read(), "alice"), cwd+"bobthoughts.bob": File("bobthoughts.bob", open("bobthoughts.bob").read(), "bob"), cwd+"fl@g.txt": File("fl@g.txt", open("fl@g.txt").read(), "eve"), } class Command: valid_commands = { "login": "Login as a user.\r\n\tUsage: login <username>", "cat": "Display file contents (absolute paths only).\r\n\tUsage: cat <filename>", "ls": "List files in the current directory.\r\n\tUsage: ls", "whoami": "Display current users.\r\n\tUsage: whoami", "pwd": "Print working directory.\r\n\tUsage: pwd", "help": "Display this help text.\r\n\tUsage: help", } def __init__(self, cmd): self.cmd = cmd def start(self): global g Process(target=self.run, args=tuple()).start() def run(self): global screen_buffer, users, current_user if self.cmd.strip() == '': screen_buffer += list('\r\n>>> ') return cmd_vals = self.cmd.strip().split() cmd = cmd_vals[0] args = cmd_vals[1:] if cmd in users[current_user.value].disallowed_commands: screen_buffer += fmt(f"{self.cmd}\r\nUser {current_user.value} does not have permission to run {cmd}.\r\n") elif cmd not in self.valid_commands: screen_buffer += fmt(f"{self.cmd}\r\nInvalid command '{cmd}'.\r\n") else: screen_buffer += fmt(self.cmd + "\r\n") func = getattr(self, f"_{cmd}") screen_buffer += fmt(func(*args)) screen_buffer += list(">>> ") def _login(self, *args): global current_user if len(args) == 0: return "Must provide user to login as.\r\n" if args[0] in users: current_user.value = args[0] return f"Logged in as {current_user.value}\r\n" return "That user doesn't exist!\r\n" def _cat(self, *args): global files, current_user if len(args) == 0: return "No file provided.\r\n" fname = args[0] if fname[0][0] != '/': return "Absolute paths only.\r\n" if fname not in files: return "File not found.\r\n" if files[fname].owner != current_user.value: return f"User {current_user.value} does not have permission to read file {fname}.\r\n" return files[fname].contents def _ls(self, *args): global files ret = "Filename\t\t\t\tOwner\r\n" ret += '-'*48 + "\r\n" for fname in files: ret += fname + "\t\t\t" + files[fname].owner + '\r\n' return ret def _help(self, *args): global current_user, users ret = '' for cmd in self.valid_commands: if cmd in users[current_user.value].disallowed_commands: continue ret += cmd + ":\t" + self.valid_commands[cmd] + "\r\n\r\n" return ret[:-1] def _whoami(self, *args): global current_user return current_user.value + "\r\n" def _pwd(self, *args): global cwd return cwd + "\r\n" def p(*args, **kwargs): global screen print(*args, **kwargs) screen._stream.flush() # quick hack to make colors work on remote # comment this class out if running locally class fg: yellow = '\033[33m' blue = '\033[34m' purple = '\033[35m' cyan = '\033[36m' red = '\033[31m' lightgreen = '\033[92m' lightmagenta = '\033[95m' default = '\033[37m' def fmt(s): highlights = { r"((?<=\W)\d+(?=\W))": fg.yellow, r"((['\"]).*?\2)": fg.blue, "(" + '|'.join(i for i in Command.valid_commands) + ')': fg.cyan, r"((/.+)+\.[a-z]{3})": fg.lightmagenta, r"((?<=\W)(" + '|'.join(i for i in users) + r')(?<=\W))': fg.purple, r"(ictf{.*?})": fg.lightgreen, r"(jctf{.*?})": fg.red, } for rx in highlights: s = re.sub(rx, highlights[rx] + r"\1" + fg.default, s) return list(s) def clr(): global screen p(screen.clear, end='') p(screen.move_to(0, 0), end='') def read_key(): key = wait_key() if key == '\x1b': for _ in range(2): key += wait_key() return key def handle_key(): global user_input, history, history_idx, user_input_store key = read_key() match key: case "\x03": exit() # Ctrl+C case "\x04": exit() # Ctrl+D case "\x7f": if len(user_input) > 0: user_input = user_input[:-1] case "\r" | "\n" | "\r\n": Command(user_input).start() if len(user_input.strip()) > 0: history.append(user_input) history_idx = 0 user_input_store = "" user_input = "" case '\x1b[A': # up history_idx += 1 if history_idx > len(history): history_idx = len(history) user_input = [user_input_store, *history][-history_idx] case '\x1b[B': # down history_idx -= 1 if history_idx < 0: history_idx = 0 user_input = [user_input_store, *history][-history_idx] # I wish I had the time to implement right/left arrow keys case '\x1b[C': # right ... case '\x1b[D': # left ... case _: user_input += key user_input_store = user_input def main(): global screen, screen_buffer, user_input with screen.fullscreen(): screen_buffer += list(">>> ") p(">>> ", end='') while 1: handle_key() text = ''.join(screen_buffer) clr() p(text, end='') p(user_input, end='') if __name__ == '__main__': with Screen(force=True) as screen: with Manager() as g: screen_buffer = g.list([]) current_user = g.Value(str, "alice") main()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/misc/deletion/main.py
ctfs/ImaginaryCTF/2023/misc/deletion/main.py
#!/usr/bin/env python3 canary = "You will not get the flag!" inp = input("Enter your payload: ") reward = input("Enter your reward: ") for c in inp: if ord(c) < ord('\n') or ord(c) > ord('~'): print("Fail!") exit() if any([n in inp for n in "dfjlquvwz=_.~!@#$%^&*()[]{}\n;\"'?<>/\\-+|`0123456789 \t"]): print("Fail!") exit() d = ['__name__', '__doc__', '__package__', '__loader__', '__spec__', '__build_class__', '__import__', 'abs', 'all', 'any', 'ascii', 'bin', 'breakpoint', 'callable', 'chr', 'compile', 'delattr', 'dir', 'divmod', 'eval', 'exec', 'format', 'getattr', 'globals', 'hasattr', 'hash', 'hex', 'id', 'input', 'isinstance', 'issubclass', 'iter', 'aiter', 'len', 'locals', 'max', 'min', 'next', 'anext', 'oct', 'ord', 'pow', 'print', 'repr', 'round', 'setattr', 'sorted', 'sum', 'vars', 'None', 'Ellipsis', 'NotImplemented', 'False', 'True', 'bool', 'memoryview', 'bytearray', 'bytes', 'classmethod', 'complex', 'dict', 'enumerate', 'filter', 'float', 'frozenset', 'property', 'int', 'list', 'map', 'object', 'range', 'reversed', 'set', 'slice', 'staticmethod', 'str', 'super', 'tuple', 'type', 'zip', '__debug__', 'BaseException', 'Exception', 'TypeError', 'StopAsyncIteration', 'StopIteration', 'GeneratorExit', 'SystemExit', 'ModuleNotFoundError', 'OSError', 'EnvironmentError', 'IOError', 'EOFError', 'RuntimeError', 'RecursionError', 'NotImplementedError', 'UnboundLocalError', 'AttributeError', 'SyntaxError', 'IndentationError', 'TabError', 'LookupError', 'IndexError', 'KeyError', 'ValueError', 'UnicodeError', 'UnicodeEncodeError', 'UnicodeDecodeError', 'UnicodeTranslateError', 'AssertionError', 'ArithmeticError', 'FloatingPointError', 'OverflowError', 'ZeroDivisionError', 'SystemError', 'ReferenceError', 'MemoryError', 'BufferError', 'Warning', 'UserWarning', 'EncodingWarning', 'DeprecationWarning', 'PendingDeprecationWarning', 'SyntaxWarning', 'RuntimeWarning', 'FutureWarning', 'ImportWarning', 'UnicodeWarning', 'BytesWarning', 'ResourceWarning', 'ConnectionError', 'BlockingIOError', 'BrokenPipeError', 'ChildProcessError', 'ConnectionAbortedError', 'ConnectionRefusedError', 'ConnectionResetError', 'FileExistsError', 'FileNotFoundError', 'IsADirectoryError', 'NotADirectoryError', 'InterruptedError', 'PermissionError', 'ProcessLookupError', 'TimeoutError', 'open', 'quit', 'exit', 'copyright', 'credits', 'license', 'help'] dl = vars(__builtins__) g = list(globals().keys()) gl = globals() for n in d: if not n == "exec": del dl[n] for n in g: if not n in ["canary", "inp", "reward"]: del gl[n] del g del gl exec(inp) try: canary except: exec(reward)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/misc/Get_and_set/server.py
ctfs/ImaginaryCTF/2023/misc/Get_and_set/server.py
#!/usr/bin/env python3 import pydash class Dummy: pass if __name__ == "__main__": obj = Dummy() while True: src = input("src: ") dst = input("dst: ") pydash.set_(obj, dst, pydash.get(obj, src))
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/misc/You_shall_not_call_Revenge/server.py
ctfs/ImaginaryCTF/2023/misc/You_shall_not_call_Revenge/server.py
import __main__ import pickle import io # Security measure -- forbid calls for op in ['reduce', 'inst', 'obj', 'newobj', 'newobj_ex']: #pickle.REDUCE, pickle.INST, pickle.OBJ, pickle.NEWOBJ, pickle.NEWOBJ_EX]: id = getattr(pickle, op.upper())[0] delattr(pickle._Unpickler, pickle._Unpickler.dispatch[id].__name__) pickle._Unpickler.dispatch[id] = lambda _: print("Stop right there, you heineous criminal!") or exit() # Security measure -- remove dangerous class and method del pickle.Unpickler del pickle._Unpickler.find_class # Security measure -- overload unpickler with an actually secure class class SecureUnpickler(pickle._Unpickler): def find_class(self, _: str, name: str) -> object: # Security measure -- prevent access to dangerous elements for x in ['exe', 'os', 'break', 'set', 'eva', 'help', 'sys', 'load', 'open', 'dis']: if x in name: print("Smuggling contraband in broad daylight?! Guards!") break # Security measure -- only the main module is a valid lookup target else: return getattr(__main__, name) # Security measure -- remove dangerous magic for k in list(globals()): if '_' in k and k not in ['__main__', '__builtins__']: del globals()[k] # Security measure -- remove dangerous magic __builtins__ = { k: getattr(__builtins__, k) for k in dir(__builtins__) if '_' not in k } # My jail is very secure! data = io.BytesIO(bytes.fromhex(input('$ '))) SecureUnpickler(data).load()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/misc/You_shall_not_call/server.py
ctfs/ImaginaryCTF/2023/misc/You_shall_not_call/server.py
import __main__ import pickle import io # Security measure -- forbid calls for op in ['reduce', 'inst', 'obj', 'newobj', 'newobj_ex']: #pickle.REDUCE, pickle.INST, pickle.OBJ, pickle.NEWOBJ, pickle.NEWOBJ_EX]: id = getattr(pickle, op.upper())[0] delattr(pickle._Unpickler, pickle._Unpickler.dispatch[id].__name__) pickle._Unpickler.dispatch[id] = lambda _: print("Stop right there, you heineous criminal!") or exit() # Security measure -- remove dangerous class and method del pickle.Unpickler del pickle._Unpickler.find_class # Security measure -- overload unpickler with an actually secure class class SecureUnpickler(pickle._Unpickler): def find_class(self, _: str, name: str) -> object: # Security measure -- prevent access to dangerous elements for x in ['exe', 'os', 'break', 'set', 'eva', 'help', 'sys', 'load', 'open', 'dis']: if x in name: print("Smuggling contraband in broad daylight?! Guards!") break # Security measure -- only the main module is a valid lookup target else: return getattr(__main__, name) # Security measure -- remove dangerous magic for k in list(globals()): if '_' in k and k not in ['__main__', '__builtins__']: del globals()[k] # Security measure -- remove dangerous magic __builtins__ = { k: getattr(__builtins__, k) for k in dir(__builtins__) if '_' not in k } # My jail is very secure! data = io.BytesIO(bytes.fromhex(input('$ '))) SecureUnpickler(data).load()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/rev/chaos/chall.py
ctfs/ImaginaryCTF/2023/rev/chaos/chall.py
inp = input("What is the flag? ").encode().zfill(51)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
true
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/rev/Sheepish/sheepish.py
ctfs/ImaginaryCTF/2023/rev/Sheepish/sheepish.py
print((((lambda _____________:((lambda ___:_____________(lambda _______:___(___)(_______)))(lambda ___:_____________(lambda _______:___(___)(_______)))))(lambda _____________:lambda ___________:lambda ______:(lambda ____:(lambda _:_(lambda __________:lambda _____:__________))(____))(___________)(lambda _:(lambda __________:lambda _____:__________))(lambda _:(lambda __________:lambda _____:__________(_____)(lambda __________:lambda _____:_____))((lambda __________:lambda _____:(lambda __________:lambda _____:__________(_____)(lambda __________:lambda _____:_____))((lambda __________:lambda _____:(lambda __________:__________(lambda _:(lambda __________:lambda _____:_____))(lambda __________:lambda _____:__________))((lambda __________:lambda _____:_____(lambda __:lambda _____________:lambda ___:__(lambda ____________:lambda _________:_________(____________(_____________)))(lambda _:___)(lambda __________:__________))(__________))(_____)(__________)))(__________)(_____))((lambda __________:lambda _____:(lambda __________:__________(lambda _:(lambda __________:lambda _____:_____))(lambda __________:lambda _____:__________))((lambda __________:lambda _____:_____(lambda __:lambda _____________:lambda ___:__(lambda ____________:lambda _________:_________(____________(_____________)))(lambda _:___)(lambda __________:__________))(__________))(__________)(_____)))(__________)(_____)))((lambda ____:(lambda _:_(lambda __________:lambda _____:__________))((lambda _:_(lambda __________:lambda _____:_____))(____)))(___________))((lambda ____:(lambda _:_(lambda __________:lambda _____:__________))((lambda _:_(lambda __________:lambda _____:_____))(____)))(______)))(_____________((lambda ____:(lambda _:_(lambda __________:lambda _____:_____))((lambda _:_(lambda __________:lambda _____:_____))(____)))(___________))((lambda ____:(lambda _:_(lambda __________:lambda _____:_____))((lambda _:_(lambda __________:lambda _____:_____))(____)))(______))))(lambda __________:lambda _____:__________)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:__________)(lambda __________:lambda _____:__________))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____)))))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____)))))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____)))))))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))(lambda __________:lambda _____:__________(__________(__________(_____)))))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____)))))(lambda __________:lambda _____:__________(__________(__________(_____)))))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))(lambda __________:lambda _____:_____)))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))(lambda __________:lambda _____:_____)))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))(lambda __________:lambda _____:_____)))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))(lambda __________:lambda _____:__________(__________(_____)))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____)))))(lambda __________:lambda _____:__________(__________(__________(_____)))))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____)))))))(lambda __________:lambda _____:_____)))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))(lambda __________:lambda _____:__________(__________(__________(_____)))))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))(lambda __________:lambda _____:__________(__________(__________(_____)))))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____)))))(lambda __________:lambda _____:__________(__________(_____))))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____)))))))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____)))))(lambda __________:lambda _____:__________(__________(__________(_____)))))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))(lambda __________:lambda _____:__________(__________(__________(_____)))))(lambda __________:lambda _____:_____)))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____)))))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____)))))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____)))))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____)))))))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____)))))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(__________(_____))))(lambda __________:lambda _____:__________(__________(_____))))))(((lambda _____________:((lambda ___:_____________(lambda _______:___(___)(_______)))(lambda ___:_____________(lambda _______:___(___)(_______)))))(lambda _____________:(lambda ________:(((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))(_____________(________[1:]))(((lambda _____________:((lambda ___:_____________(lambda _______:___(___)(_______)))(lambda ___:_____________(lambda _______:___(___)(_______)))))(lambda _____________:(lambda __:(((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____________(__-1))) if __ else (lambda __________:lambda _____:_____)))))(________[0]))) if len(________) else ((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:__________)(lambda __________:lambda _____:__________))))))(input(">>> ").encode())))("Well done!")("Try again..."))
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/rev/snailchecker/check.py
ctfs/ImaginaryCTF/2023/rev/snailchecker/check.py
#!/usr/bin/env python3 def enc(b): a = [n for n in range(b[0]*2**24+b[1]*2**16+b[2]*2**8+b[3]+1)][1:] c,i = 0,0 while len([n for n in a if n != 0]) > 1: i%=len(a) if (a[i]!=0 and c==1): a[i],c=0,0 if (a[i] != 0): c+=1 i += 1 return sum(a) print(r""" .----. @ @ / .-"-.`. \v/ | | '\ \ \_/ ) ,-\ `-.' /.' / '---`----'----' """) flag = input("Enter flag here: ").encode() out = b'' for n in [flag[i:i+4] for i in range(0,len(flag),4)]: out += bytes.fromhex(hex(enc(n[::-1]))[2:].zfill(8)) if out == b'L\xe8\xc6\xd2f\xde\xd4\xf6j\xd0\xe0\xcad\xe0\xbe\xe6J\xd8\xc4\xde`\xe6\xbe\xda>\xc8\xca\xca^\xde\xde\xc4^\xde\xde\xdez\xe8\xe6\xde': print("[*] Flag correct!") else: print("[*] Flag incorrect.")
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/rev/Goated/goated.py
ctfs/ImaginaryCTF/2023/rev/Goated/goated.py
print((((lambda ______:((lambda ___:______(lambda _:___(___)(_)))(lambda ___:______(lambda _:___(___)(_)))))(lambda ______:lambda __:lambda _________________:(lambda _________:(lambda _____________:_____________(lambda ____________:lambda ______________:____________))(_________))(__)(lambda _:(lambda ____________:lambda ______________:____________))(lambda _:(lambda ____________:lambda ______________:____________(______________)(lambda ____________:lambda ______________:______________))((lambda ____________:lambda ______________:(lambda ____________:____________(lambda ____________:lambda ______________:______________)(lambda ____________:lambda ______________:____________))((lambda ____________:lambda ______________:____________(______________(lambda ____________:lambda ______________:______________)(lambda ____________:lambda ______________:____________))(______________(lambda ____________:lambda ______________:____________)(lambda ____________:lambda ______________:______________)))(____________)(______________)))((lambda _________:(lambda _____________:_____________(lambda ____________:lambda ______________:____________))((lambda _____________:_____________(lambda ____________:lambda ______________:______________))(_________)))(__))((lambda _________:(lambda _____________:_____________(lambda ____________:lambda ______________:____________))((lambda _____________:_____________(lambda ____________:lambda ______________:______________))(_________)))(_________________))) (______((lambda _________:(lambda _____________:_____________(lambda ____________:lambda ______________:______________))((lambda _____________:_____________(lambda ____________:lambda ______________:______________))(_________)))(__))((lambda _________:(lambda _____________:_____________(lambda ____________:lambda ______________:______________))((lambda _____________:_____________(lambda ____________:lambda ______________:______________))(_________)))(_________________))))(lambda ____________:lambda ______________:____________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
true
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/crypto/Imaginary_Casino/server.py
ctfs/ImaginaryCTF/2023/crypto/Imaginary_Casino/server.py
import ctypes import os from hashlib import sha512 import signal # libcsidh interop start # modified from DiceCTF 2023 - seaside PRIVATE_KEY_SIZE = 74 PUBLIC_KEY_SIZE = 64 MAX_EXPONENT = 5 # libcsidh: https://yx7.cc/code/csidh/csidh-latest.tar.xz # Run this to build libcsidh: `(cd csidh-20210627; make; mv libcsidh.so ..)` libcsidh = ctypes.CDLL("./libcsidh.so") def apply_iso(start, iso): end = ctypes.create_string_buffer(PUBLIC_KEY_SIZE) ret = libcsidh.csidh(end, start, iso) if not ret: raise RuntimeError("csidh failed") return end def pub_from(buf): return ctypes.create_string_buffer(buf, PUBLIC_KEY_SIZE) def priv_from(es): return ctypes.create_string_buffer(bytes([e & 0xFF for e in es]), PRIVATE_KEY_SIZE) def rand_priv(): priv = ctypes.create_string_buffer(PRIVATE_KEY_SIZE) libcsidh.csidh_private(priv) return priv def hash_to_priv(buf): v = int(sha512(bytes(buf)).hexdigest(), 16) es = [] M = 2 * MAX_EXPONENT + 1 for _ in range(PRIVATE_KEY_SIZE): es.append(v % M - MAX_EXPONENT) v //= M return priv_from(es) # libcsidh interop end c1 = libcsidh.base leet = [1, 3, 3, 7] leet = (leet * (PRIVATE_KEY_SIZE // len(leet) + 1))[:PRIVATE_KEY_SIZE] c2 = apply_iso(libcsidh.base, priv_from(leet)) class RNG: def __init__(self, c1, c2, l, r): self.c1 = c1 self.c2 = c2 self.l = l self.r = r self.c = 0 self.v = 0 self.trunc = 12 def next(self): self.l, self.r = self.r, hash_to_priv( apply_iso(apply_iso(self.c1, self.l), self.r) ) return int.from_bytes( bytes(apply_iso(apply_iso(self.c2, self.r), self.l)), "little" ) def bit(self): if self.c == 0: self.v = self.next() self.c = PUBLIC_KEY_SIZE * 8 - self.trunc self.c -= 1 r = self.v & 1 self.v >>= 1 return r class Game: def __init__(self, rng): self.rng = rng self.money = 1337 self.win = 13337 def round(self): bit = int(input("guess > ")) if bit == self.rng.bit(): self.money += 1 print("You win!") else: self.money -= 3 print("You lose!") def play(self): print("Welcome to Imaginary Casino!") print( "Immerse yourself in the captivating simplicity of Imaginary Casino, where a single game of coin flip becomes a thrilling quantum experience. Powered by a quantum-secure random number generator, every flip is truly unpredictable, ensuring an unparalleled level of fairness and excitement." ) print( f"You begin your journey at Imaginary Casino with an initial balance of ${self.money}, and as you progress, the grand flag awaits you once you reach the milestone of ${self.win}." ) print("(Generated by ChatGPT)") print() while self.money > 0: self.round() print(f"You have ${self.money} left.") if self.money >= self.win: print("Here's your flag:") with open("flag.txt") as f: print(f.read().strip()) return print("You're broke!") if __name__ == "__main__": signal.alarm(30) rng = RNG(c1, c2, rand_priv(), rand_priv()) Game(rng).play()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/crypto/emoticons/gen.py
ctfs/ImaginaryCTF/2023/crypto/emoticons/gen.py
import random emojis = [n for n in "๐ŸŒธ๐Ÿ”๐Ÿณ๐Ÿš€๐ŸŒž๐ŸŽ‰๐Ÿฆ๐ŸŽˆ๐Ÿถ๐Ÿ•๐ŸŒบ๐ŸŽธโšก๏ธ๐Ÿฆ‹๐ŸŒผ๐ŸŽ"] m = open("text.txt", "rb").read().hex() random.shuffle(emojis) for e, c in zip(emojis, "0123456789abcdef"): m = m.replace(c, e) open("out.txt", "w").write(m)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/crypto/Sus/challenge.py
ctfs/ImaginaryCTF/2023/crypto/Sus/challenge.py
from Crypto.Util.number import getPrime, isPrime, bytes_to_long def sus(sz, d): while True: p = getPrime(sz) pp = sum([p**i for i in range(d)]) if isPrime(pp): return p, pp p, q = sus(512, 3) r = getPrime(512 * 3) n = p * q * r e = 65537 m = bytes_to_long(open("flag.txt", "rb").read().strip()) c = pow(m, e, n) print(f"{n = }") print(f"{e = }") print(f"{c = }")
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/crypto/Wasteful/chall.py
ctfs/ImaginaryCTF/2023/crypto/Wasteful/chall.py
from Crypto.Util.number import * from math import gcd def keygen(sz): p = getPrime(sz // 2) q = getPrime(sz // 2) n = p * q phi = (p - 1) * (q - 1) e_fast = getPrime(sz // 2) # to make encryption more time consuming :P e_slow = e_fast + getPrime(sz // 3) * phi d = pow(e_fast, -1, phi) return (n, e_slow), (n, e_fast), (n, d) def encrypt(pub, m): n, e = pub return pow(m, e, n) def decrypt(priv, c): n, d = priv return pow(c, d, n) pub, pub_fast, priv = keygen(2048) m = bytes_to_long(open("flag.txt", "rb").read().strip()) c = encrypt(pub, m) assert c == encrypt(pub_fast, m) assert decrypt(priv, c) == m print(f"{pub = }") print(f"{c = }")
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/crypto/Blind_guess/main.py
ctfs/ImaginaryCTF/2023/crypto/Blind_guess/main.py
from random import getrandbits from galois import GF import numpy as np DECK = "๐Ÿ‚ก๐Ÿ‚ข๐Ÿ‚ฃ๐Ÿ‚ค๐Ÿ‚ฅ๐Ÿ‚ฆ๐Ÿ‚ง๐Ÿ‚จ๐Ÿ‚ฉ๐Ÿ‚ช๐Ÿ‚ซ๐Ÿ‚ญ๐Ÿ‚ฎ" F = GF(13) # lucky number n = 10 # Let's not use a singular matrix, please. # We do quality random over here. M = [[0]] while np.linalg.det(M) == 0: M = F.Random((n, n)) money = 15000 cards = F.Random(n) while all(int(c) == 0 for c in cards): cards = F.Random(n) while money > 0: print('balance:', money) choice = input('> ') if choice == 'buy flag': if money < 1_000_000_000: print("You're too poor!") continue from redacted import FLAG money -= 1_000_000_000 print("What a guess god! Here's your flag:", FLAG) elif choice == 'play': bet = int(input('bet: ')) assert money >= bet > 0 print("Can you blindly guess my cards?") cards = np.linalg.matrix_power(M, getrandbits(32)) @ cards # shuffle cards guess = M @ F([*map(DECK.index, input('guess: ').split())]) # blind guess total = sum(cards == guess) print(f'You guessed {total} cards! My hand was:', *[DECK[c] for c in cards]) money += 2*(total - 5)*bet elif choice == 'exit': print("Chickened out, huh? No flag for you.") exit() print("Woops... Looks like you guessed your way out of money :>")
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/crypto/signer/main.py
ctfs/ImaginaryCTF/2023/crypto/signer/main.py
import textwrap from binascii import crc32 from Crypto.Util.number import getPrime p, q = getPrime(1024), getPrime(1024) n = p*q e = 65537 d = pow(e, -1, (p-1)*(q-1)) PASSWORD = b"give me the flag!!!" print("--------------------------------------------------------------") print(" Welcome to the secure signing app! ") print(" I will sign whatever you want, except the secret password. ") print("--------------------------------------------------------------") print() print("--------------------------------------------------------------") print("\n".join(textwrap.wrap(f"{n = }", len("-------------------------------------------------------------")))) print("--------------------------------------------------------------") print() while True: print("1. Sign") print("2. Get flag") choice = int(input()) if choice == 1: print("Enter message:") message = input().encode() # crc32 is secure and has no collisions, but just in case if message == PASSWORD or crc32(message) == crc32(PASSWORD): print("Stop this trickery!") exit() print("Signature:", pow(crc32(message), d, n)) elif choice == 2: print("Enter the signature for the password:") s = int(input()) if pow(s, e, n) == crc32(PASSWORD): print("You win! The flag is", open("flag.txt").read()) exit() else: print("Wrong.") exit()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/forensic/crypto/gen.py
ctfs/ImaginaryCTF/2023/forensic/crypto/gen.py
#!/usr/bin/env python3 import os key = [line.strip() for line in open("private.pem", "rb").readlines()[1:-1]] c = open("core.raw", "rb").read() # coredump of `python3 script.py` for line in key: c = c.replace(line, b"A"*len(line)) open("core", "wb").write(c) os.system("openssl rsautl -encrypt -inkey public.pem -pubin -in flag.txt -out flag.enc")
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/forensic/crypto/script.py
ctfs/ImaginaryCTF/2023/forensic/crypto/script.py
from Crypto.PublicKey import RSA t = open('private.pem', "r").read() key = RSA.importKey(t) input()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/web/amogus/auth/app.py
ctfs/ImaginaryCTF/2023/web/amogus/auth/app.py
from flask import Flask, request, make_response, redirect, url_for from jinja2 import Environment, select_autoescape, FileSystemLoader from flask_sqlalchemy import SQLAlchemy app = Flask(__name__) app.config["SQLALCHEMY_DATABASE_URI"] = "sqlite:////database.db" app.config["SQLALCHEMY_TRACK_MODIFICATIONS"] = False db = SQLAlchemy(app) loader = FileSystemLoader(searchpath="templates/") env = Environment(loader=loader) class User(db.Model): id = db.Column(db.Integer, primary_key=True) username = db.Column(db.String(50), unique=True, nullable=False) password = db.Column(db.String(50), nullable=False) email = db.Column(db.String(100), nullable=False) emails = db.relationship("Email", backref="user", lazy=True) def __repr__(self): return f"User('{self.username}', '{self.email}')" class Email(db.Model): id = db.Column(db.Integer, primary_key=True) subject = db.Column(db.String(100), nullable=False) body = db.Column(db.Text, nullable=False) user_id = db.Column(db.Integer, db.ForeignKey("user.id"), nullable=False) def __repr__(self): return f"Email('{self.subject}', '{self.body}')" @app.route('/', methods=["GET", "POST"]) def login(): if request.method == "GET": error = request.args.get("error", "") return make_response(env.get_template("login.html").render(error=error)) if request.method == "POST": username = request.form["username"] password = request.form["password"] user = User.query.filter_by(username=username).first() if user and user.password == password: return redirect(f"http://mail.supersus.corp/auth?auth={password}") else: error = "Invalid username or password." return redirect(url_for("login", error=error)) if __name__ == "__main__": with app.app_context(): app.run("0.0.0.0", port=8081)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/web/amogus/mail/app.py
ctfs/ImaginaryCTF/2023/web/amogus/mail/app.py
from flask import Flask, render_template, request, make_response, redirect from flask_sqlalchemy import SQLAlchemy import os import random import string import faker app = Flask(__name__) app.config["SQLALCHEMY_DATABASE_URI"] = "sqlite:////database.db" app.config["SQLALCHEMY_TRACK_MODIFICATIONS"] = False fake = faker.Faker() db = SQLAlchemy(app) class User(db.Model): id = db.Column(db.Integer, primary_key=True) username = db.Column(db.String(50), unique=True, nullable=False) password = db.Column(db.String(50), nullable=False) email = db.Column(db.String(100), nullable=False) emails = db.relationship("Email", backref="user", lazy=True) def __repr__(self): return f"User('{self.username}', '{self.email}')" class Email(db.Model): id = db.Column(db.Integer, primary_key=True) subject = db.Column(db.String(100), nullable=False) body = db.Column(db.Text, nullable=False) user_id = db.Column(db.Integer, db.ForeignKey("user.id"), nullable=False) def __repr__(self): return f"Email('{self.subject}', '{self.body}')" @app.route("/") def index(): users = User.query.all() return render_template("index.html", users=users), 200 @app.route("/auth") def auth(): response = make_response(redirect('/')) response.set_cookie('auth', request.args.get("auth", "")) return response, 200 @app.route("/emails/<int:user_id>") def view_emails(user_id): user = User.query.get_or_404(user_id) if not "auth" in request.cookies or request.cookies["auth"] != user.password: return "Unauthorized", 404 keyword = request.args.get("search", "") emails = Email.query.filter_by(user_id=user.id).filter( (Email.subject.contains(keyword)) | (Email.body.contains(keyword)) ).all() if not emails: return render_template("emails.html", user=user, emails=emails), 404 else: return render_template("emails.html", user=user, emails=emails), 200 def initialize(): users = [] users.append(User(username="admin", email="admin@supersus.corp", password=open("secret.txt").read().strip())) for name in ["red", "blue", "green", "pink", "orange", "yellow", "black", "white", "purple", "brown", "cyan", "lime", "maroon", "rose", "banana", "gray", "tan", "coral"]: users.append(User(username=name, email=f"{name}@supersus.corp", password="".join(random.choice(string.ascii_letters) for n in range(20)))) emails = [] for _ in range(500): emails.append(Email(subject=f"Message from {fake.company()}", body=fake.text(), user=random.choice(users))) emails.append(Email(subject=f"Message from ImaginaryCTF", body=open("flag.txt").read(), user=users[0])) for _ in range(500): emails.append(Email(subject=f"Message from {fake.company()}", body=fake.text(), user=random.choice(users))) items = [] items.extend(users) items.extend(emails) db.session.add_all(items) db.session.commit() if __name__ == "__main__": with app.app_context(): os.system("rm /database.db") db.create_all() initialize() app.run("0.0.0.0", port=8080)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/web/Perfect_Picture/app.py
ctfs/ImaginaryCTF/2023/web/Perfect_Picture/app.py
from flask import Flask, render_template, request from PIL import Image import exiftool import random import os app = Flask(__name__) app.debug = False os.system("mkdir /dev/shm/uploads/") app.config['UPLOAD_FOLDER'] = '/dev/shm/uploads/' app.config['ALLOWED_EXTENSIONS'] = {'png'} def check(uploaded_image): with open('flag.txt', 'r') as f: flag = f.read() with Image.open(app.config['UPLOAD_FOLDER'] + uploaded_image) as image: w, h = image.size if w != 690 or h != 420: return 0 if image.getpixel((412, 309)) != (52, 146, 235, 123): return 0 if image.getpixel((12, 209)) != (42, 16, 125, 231): return 0 if image.getpixel((264, 143)) != (122, 136, 25, 213): return 0 with exiftool.ExifToolHelper() as et: metadata = et.get_metadata(app.config['UPLOAD_FOLDER'] + uploaded_image)[0] try: if metadata["PNG:Description"] != "jctf{not_the_flag}": return 0 if metadata["PNG:Title"] != "kool_pic": return 0 if metadata["PNG:Author"] != "anon": return 0 except: return 0 return flag def allowed_file(filename): return '.' in filename and filename.rsplit('.', 1)[1].lower() in app.config['ALLOWED_EXTENSIONS'] @app.route('/') def index(): return render_template('index.html') @app.route('/upload', methods=['POST']) def upload(): if 'file' not in request.files: return 'no file selected' file = request.files['file'] if file.filename == '': return 'no file selected' if file and allowed_file(file.filename): filename = file.filename img_name = f'{str(random.randint(10000, 99999))}.png' file.save(app.config['UPLOAD_FOLDER'] + img_name) res = check(img_name) if res == 0: os.remove(app.config['UPLOAD_FOLDER'] + img_name) return("hmmph. that image didn't seem to be good enough.") else: os.remove(app.config['UPLOAD_FOLDER'] + img_name) return("now that's the perfect picture:<br>" + res) return 'invalid file' if __name__ == '__main__': app.run()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2022/pwn/FormatStringFoolery/wrapper.py
ctfs/ImaginaryCTF/2022/pwn/FormatStringFoolery/wrapper.py
#!/usr/bin/env python3 from subprocess import PIPE, Popen import sys flag = open("flag.txt", "rb").read().strip() # thanks to pepsipu for the idea sys.stdout.write("Enter input:\n") inp = sys.stdin.readline().encode() for _ in range(10): p = Popen("./fmt_foolery", stdin=PIPE, stdout=PIPE, stderr=PIPE) if flag in p.communicate(input=inp, timeout=4)[0]: sys.stdout.write(f"passed round {_}\n") else: sys.stdout.write(f"failed round {_}\n") exit() sys.stdout.write(f"Your flag is {flag}\n")
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2022/pwn/pywrite/vuln.py
ctfs/ImaginaryCTF/2022/pwn/pywrite/vuln.py
from ctypes import c_ulong def read(where): return c_ulong.from_address(where).value def write(what, where): c_ulong.from_address(where).value = what menu = '''|| PYWRITE || 1: read 2: write > ''' while True: choice = int(input(menu)) if choice == 1: where = int(input("where? ")) print(read(where)) if choice == 2: what = int(input("what? ")) where = int(input("where? ")) write(what, where) if choice == 3: what = input("what????? ") a = open(what) print(a)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2022/rev/desrever/desrever.py
ctfs/ImaginaryCTF/2022/rev/desrever/desrever.py
#!/usr/bin/env python3 cexe = exec cexe(')]"}0p381o91_flnj_3ycvgyhz_av_tavferire{sgpv"==)]pni ni _ rof _ esle "9876543210_}{" ni ton _ fi ]_[d.siht[(nioj.""[)"tcerroc","gnorw"((tnirp;)" >>>"(tupni=pni;)"?galf eht si tahW"(tnirp;siht tropmi'[::-1])
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2022/rev/OneLinerRevenge/revenge.py
ctfs/ImaginaryCTF/2022/rev/OneLinerRevenge/revenge.py
[globals().__setitem__(chr(0x67),globals()),g.__setitem__(chr(0x74),lambda*a:bytes.fromhex('{:x}'.format(a[0])).decode()),g.__setitem__(t(103),type('',(dict,),{t(6872320826472685407):lambda*a:{**{_:getattr(a[0],t(115298706365414908258770783))(*[(i%8if type(i)is(1).__class__ else i)for(i)in _[::-1]])for(_)in a[1:]},a.__reduce__:a[0]}.popitem()[len(a)%2*2-1],t(115298485004486023744151391):lambda*a:dict.__getitem__(*[(i%8if type(i)is(4).__class__ else i)for(i)in a])})()),[g((lambda*a:(print(*a),exit()),13463))((type('',([].__class__,),{t(6872326324148002655):lambda*a:1,t(6872320826472685407):lambda*a:g(([a[0].insert(0,list.pop(a[0])),a[0]][1][a[-1]],14701)),t(107135549927012):lambda*a:[list.append(a[0],_)for(_)in a[1:]],t(7368560):lambda*a:(list.pop(a[0]),a[0].reverse())[0]})(),10397))[14413].append(*[g()[11677],*[lambda*a:g[11975](t(28271))]*15]),g((open(t(540221431545043700576377)).read(),14122)),g()[11391]][any(any(_ in t(2524869067539096330)for(_)in(i))for(i)in open(t(241425488694318497730177+298795942850725202846200)))+1]((t(28271),t(1654445085483638585692+382008194344550889925))),[g((g((lambda*a:int(''.join(str(1*i)for(i)in(a)),2),12614))[15301].__getattribute__(t(1759314143624509480799))(),13195))[9923].append(*(lambda*a:(51*a[10]+56*a[0]+12*a[14]+91*a[3]+9*a[14]==96*a[19]+96*a[9]+83*a[1]+91*a[1]+43*a[22]-11543,88*a[7]+51*a[7]+27*a[9]+77*a[1]+45*a[4]==53*a[15]+6*a[22]+92*a[5]+15*a[9]+86*a[22]+7184,63*a[3]+76*a[0]+93*a[5]+64*a[3]+17*a[6]==74*a[23]+30*a[11]+21*a[9]+63*a[8]+66*a[23]+405,33*a[14]+47*a[14]+10*a[7]+97*a[18]+86*a[10]==85*a[16]+92*a[13]+45*a[19]+68*a[23]+15*a[2]-9791),lambda*a:(67*a[8]+13*a[13]+16*a[3]+17*a[20]+44*a[9]==36*a[22]+38*a[15]+72*a[23]+89*a[19]+43*a[17]-13909,36*a[19]+8*a[5]+43*a[23]+73*a[23]+78*a[3]==31*a[0]+15*a[22]+66*a[12]+48*a[21]+5*a[12]+9943,23*a[19]+68*a[23]+10*a[8]+59*a[17]+34*a[1]==20*a[18]+55*a[1]+20*a[17]+32*a[6]+39*a[2]+3539,5*a[0]+69*a[10]+25*a[18]+61*a[17]+97*a[14]==64*a[18]+29*a[18]+39*a[10]+93*a[0]+23*a[15]-5075),lambda*a:(2*a[20]+47*a[0]+80*a[16]+37*a[4]+60*a[15]==29*a[13]+21*a[11]+4*a[23]+83*a[9]+55*a[16]+10561,28*a[4]+42*a[16]+39*a[16]+3*a[20]+63*a[1]==11*a[10]+31*a[19]+9*a[19]+30*a[8]+74*a[16]+2148,78*a[21]+4*a[15]+62*a[18]+84*a[7]+96*a[16]==24*a[7]+23*a[14]+94*a[3]+46*a[2]+67*a[17]+7330,74*a[12]+66*a[0]+92*a[2]+73*a[16]+62*a[10]==18*a[2]+28*a[3]+40*a[17]+60*a[21]+54*a[17]+19097),lambda*a:(49*a[21]+62*a[12]+39*a[19]+6*a[2]+33*a[18]==65*a[14]+40*a[11]+51*a[3]+38*a[14]+61*a[17]+1787,72*a[2]+41*a[9]+17*a[2]+94*a[17]+64*a[6]==53*a[8]+69*a[7]+30*a[9]+27*a[3]+17*a[0]+13621,76*a[20]+52*a[6]+42*a[12]+32*a[21]+15*a[4]==93*a[16]+45*a[10]+76*a[15]+30*a[8]+97*a[14]-8576,49*a[13]+5*a[16]+66*a[22]+6*a[0]+15*a[4]==58*a[19]+78*a[15]+41*a[2]+3*a[15]+41*a[21]-14144),lambda*a:(81*a[7]+15*a[6]+83*a[21]+51*a[10]+25*a[15]==78*a[16]+36*a[18]+89*a[8]+74*a[9]+28*a[15]-5576,22*a[12]+69*a[7]+43*a[14]+22*a[20]+88*a[20]==92*a[6]+40*a[10]+13*a[21]+93*a[4]+69*a[8]-14574,5*a[12]+55*a[15]+38*a[23]+79*a[18]+73*a[2]==7*a[6]+68*a[13]+46*a[19]+56*a[23]+84*a[15]-1064,63*a[5]+3*a[15]+54*a[11]+53*a[17]+39*a[22]==90*a[13]+58*a[7]+80*a[14]+43*a[20]+1*a[2]-9663),lambda*a:(33*a[4]+85*a[22]+88*a[19]+11*a[19]+65*a[3]==2*a[12]+83*a[15]+51*a[3]+53*a[2]+4*a[15]+2150,16*a[13]+6*a[21]+19*a[23]+49*a[21]+48*a[9]==96*a[4]+60*a[7]+73*a[11]+79*a[9]+67*a[13]-17330,32*a[22]+25*a[14]+36*a[12]+96*a[11]+74*a[7]==65*a[6]+97*a[11]+22*a[21]+82*a[6]+58*a[4]-15919,58*a[6]+91*a[6]+48*a[15]+60*a[21]+84*a[9]==81*a[14]+3*a[2]+3*a[15]+17*a[13]+28*a[19]+23080),lambda*a:(8*a[11]+13*a[23]+70*a[20]+4*a[14]+25*a[16]==47*a[13]+56*a[9]+14*a[16]+14*a[5]+47*a[19]-2509,56*a[16]+35*a[7]+71*a[15]+82*a[11]+43*a[18]==89*a[9]+5*a[20]+38*a[10]+16*a[17]+16*a[8]+13008,60*a[22]+16*a[2]+79*a[3]+5*a[22]+99*a[7]==22*a[20]+75*a[11]+31*a[6]+4*a[15]+53*a[3]+1557,22*a[12]+36*a[19]+84*a[16]+6*a[22]+44*a[15]==94*a[18]+46*a[0]+7*a[9]+16*a[13]+69*a[23]-5508),lambda*a:(15*a[14]+37*a[4]+89*a[19]+1*a[13]+40*a[21]==58*a[7]+84*a[2]+95*a[17]+88*a[7]+58*a[8]-13680,21*a[2]+72*a[16]+92*a[14]+29*a[8]+94*a[16]==60*a[13]+90*a[16]+64*a[17]+66*a[2]+45*a[2]-7275,85*a[4]+56*a[21]+39*a[20]+5*a[9]+86*a[21]==46*a[11]+85*a[2]+79*a[20]+84*a[11]+87*a[10]-3608,98*a[13]+9*a[0]+94*a[21]+81*a[0]+92*a[16]==18*a[16]+30*a[0]+18*a[9]+17*a[17]+9*a[18]+32955),lambda*a:(99*a[13]+17*a[8]+43*a[22]+35*a[15]+63*a[11]==75*a[15]+65*a[11]+44*a[17]+68*a[14]+71*a[6]-6000,96*a[15]+77*a[19]+70*a[22]+36*a[5]+40*a[12]==92*a[8]+78*a[21]+18*a[13]+27*a[19]+64*a[19]-2898,64*a[9]+94*a[17]+20*a[16]+57*a[6]+76*a[5]==57*a[2]+66*a[21]+82*a[0]+95*a[15]+70*a[19]-16423,35*a[1]+43*a[22]+7*a[21]+88*a[9]+72*a[11]==79*a[6]+66*a[17]+43*a[1]+80*a[6]+13*a[6]-16177),lambda*a:(15*a[14]+72*a[0]+60*a[2]+66*a[17]+57*a[14]==43*a[5]+79*a[2]+3*a[16]+17*a[1]+64*a[6]+4715,46*a[8]+93*a[3]+59*a[20]+15*a[14]+84*a[6]==49*a[18]+46*a[14]+41*a[6]+37*a[1]+98*a[13]+3571,50*a[20]+62*a[5]+24*a[1]+91*a[23]+59*a[16]==52*a[20]+37*a[5]+60*a[18]+59*a[18]+25*a[11]+6503,19*a[3]+96*a[19]+38*a[22]+34*a[5]+27*a[14]==61*a[21]+74*a[10]+1*a[10]+86*a[17]+62*a[21]-14623),lambda*a:(94*a[21]+46*a[8]+21*a[14]+46*a[0]+49*a[17]==81*a[8]+97*a[8]+82*a[4]+4*a[6]+67*a[8]-10410,65*a[1]+26*a[7]+14*a[23]+51*a[22]+20*a[4]==19*a[18]+87*a[16]+27*a[21]+57*a[10]+88*a[22]-10505,83*a[17]+89*a[21]+57*a[21]+19*a[19]+42*a[3]==12*a[8]+7*a[0]+83*a[9]+8*a[10]+79*a[5]+20536,30*a[19]+67*a[17]+10*a[1]+13*a[2]+47*a[1]==87*a[10]+95*a[11]+9*a[15]+41*a[3]+80*a[16]-11542),lambda*a:(98*a[4]+29*a[16]+91*a[16]+25*a[13]+94*a[20]==41*a[17]+63*a[3]+61*a[7]+28*a[10]+89*a[7]+17506,28*a[8]+90*a[16]+12*a[20]+65*a[6]+69*a[5]==87*a[11]+33*a[4]+20*a[6]+10*a[15]+23*a[7]+11861,52*a[11]+99*a[3]+62*a[17]+69*a[12]+36*a[11]==71*a[0]+25*a[15]+49*a[6]+56*a[8]+87*a[10]-3286,95*a[0]+24*a[2]+11*a[13]+40*a[3]+85*a[18]==37*a[9]+49*a[3]+15*a[2]+51*a[11]+71*a[6]+8832),lambda*a:(22*a[7]+92*a[13]+66*a[21]+16*a[3]+89*a[17]==45*a[22]+26*a[17]+88*a[18]+78*a[22]+29*a[11]+11656,53*a[3]+77*a[18]+61*a[23]+81*a[16]+30*a[15]==70*a[16]+89*a[22]+4*a[13]+23*a[15]+94*a[18]+9747,90*a[20]+70*a[10]+53*a[0]+26*a[5]+29*a[20]==73*a[6]+21*a[21]+6*a[23]+88*a[17]+43*a[1]+3403,62*a[3]+59*a[10]+88*a[0]+77*a[9]+37*a[5]==88*a[12]+81*a[9]+49*a[17]+81*a[16]+28*a[2]-2875),lambda*a:(22*a[7]+44*a[2]+18*a[6]+73*a[1]+51*a[4]==40*a[22]+97*a[13]+27*a[4]+70*a[23]+66*a[15]-10554,18*a[23]+76*a[20]+94*a[18]+1*a[0]+87*a[5]==90*a[17]+20*a[13]+86*a[2]+28*a[12]+89*a[0]-7968,14*a[17]+38*a[20]+4*a[2]+63*a[22]+54*a[6]==48*a[11]+69*a[6]+60*a[23]+35*a[6]+87*a[7]-11706,68*a[18]+78*a[7]+31*a[10]+45*a[9]+73*a[13]==23*a[23]+14*a[7]+91*a[12]+99*a[4]+8*a[8]-445),lambda*a:(50*a[17]+66*a[20]+19*a[20]+56*a[5]+22*a[7]==77*a[2]+76*a[18]+79*a[11]+87*a[0]+65*a[13]-19932,90*a[19]+11*a[17]+61*a[21]+27*a[8]+43*a[19]==11*a[0]+41*a[19]+4*a[5]+57*a[3]+54*a[15]+7163,24*a[2]+7*a[8]+81*a[23]+42*a[6]+30*a[20]==35*a[10]+4*a[14]+87*a[18]+88*a[5]+46*a[10]-1649,27*a[5]+34*a[12]+16*a[0]+39*a[7]+89*a[10]==58*a[17]+22*a[20]+6*a[14]+20*a[4]+1*a[14]+7194),lambda*a:(39*a[5]+95*a[16]+29*a[12]+35*a[20]+2*a[23]==52*a[11]+36*a[5]+72*a[20]+47*a[10]+27*a[20]-837,37*a[13]+78*a[1]+79*a[15]+73*a[22]+96*a[6]==51*a[18]+71*a[20]+79*a[2]+60*a[8]+32*a[14]+3156,95*a[17]+8*a[17]+35*a[8]+22*a[7]+89*a[15]==26*a[20]+50*a[2]+67*a[1]+70*a[10]+30*a[14]+1114,87*a[7]+56*a[10]+41*a[7]+22*a[3]+44*a[3]==81*a[6]+79*a[12]+40*a[22]+37*a[15]+66*a[12]-10364))),g((input(t(1044266528)).encode(),15553)),g[15623]][(t(26122)[1]in g()[11618])+1]((t(11058375319408232550098454217411120665270488946811366757),t(439956237345))),[g[14349](g()[15726](*g()[10963].pop()(*g()[(3).__class__(g[13890][138])])))for(i)in iter(g()[10987].__len__,0)],g[10839](t(7955827))]
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2022/crypto/SecureEncodingBase64/encode.py
ctfs/ImaginaryCTF/2022/crypto/SecureEncodingBase64/encode.py
#!/usr/bin/env python3 from base64 import b64encode from random import shuffle charset = b'abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789+/=' shuffled = [i for i in charset] shuffle(shuffled) d = {charset[i]:v for(i,v)in enumerate(shuffled)} pt = open("flag.txt").read() while "\n\n\n" in pt: pt = pt.replace("\n\n\n", '\n\n') while ' ' in pt: pt = pt.replace(' ', ' ') assert all(ord(i)<128 for i in pt) ct = bytes(d[i] for i in b64encode(pt.encode())) f = open('out.txt', 'wb') f.write(ct)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2022/crypto/huge/chal.py
ctfs/ImaginaryCTF/2022/crypto/huge/chal.py
from Crypto.Util.number import bytes_to_long, getPrime from random import randint flag = open("flag.txt", "rb").read() def get_megaprime(): primes = [getPrime(10) for _ in range(200)] out = 1 for n in range(100): if randint(0,1) == 0: out *= primes[n] return out p = get_megaprime() q = get_megaprime() n = p*q e = 65537 m = bytes_to_long(flag) c = pow(m, e, n) print(f"{n = }") print(f"{e = }") print(f"{c = }")
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2022/crypto/Poker/poker.py
ctfs/ImaginaryCTF/2022/crypto/Poker/poker.py
from random import getrandbits from math import prod HEARTS = "๐Ÿ‚ฑ๐Ÿ‚ฒ๐Ÿ‚ณ๐Ÿ‚ด๐Ÿ‚ต๐Ÿ‚ถ๐Ÿ‚ท๐Ÿ‚ธ๐Ÿ‚น๐Ÿ‚บ๐Ÿ‚ป๐Ÿ‚ฝ๐Ÿ‚พ" SPADES = "๐Ÿ‚ก๐Ÿ‚ข๐Ÿ‚ฃ๐Ÿ‚ค๐Ÿ‚ฅ๐Ÿ‚ฆ๐Ÿ‚ง๐Ÿ‚จ๐Ÿ‚ฉ๐Ÿ‚ช๐Ÿ‚ซ๐Ÿ‚ญ๐Ÿ‚ฎ" DIAMONDS = "๐Ÿƒ๐Ÿƒ‚๐Ÿƒƒ๐Ÿƒ„๐Ÿƒ…๐Ÿƒ†๐Ÿƒ‡๐Ÿƒˆ๐Ÿƒ‰๐ŸƒŠ๐Ÿƒ‹๐Ÿƒ๐ŸƒŽ" CLUBS = "๐Ÿƒ‘๐Ÿƒ’๐Ÿƒ“๐Ÿƒ”๐Ÿƒ•๐Ÿƒ–๐Ÿƒ—๐Ÿƒ˜๐Ÿƒ™๐Ÿƒš๐Ÿƒ›๐Ÿƒ๐Ÿƒž" DECK = SPADES+HEARTS+DIAMONDS+CLUBS # Bridge Ordering of a Deck ALPHABET52 = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnop_rstuvw{y}" CARDS_PER_DEAL = 25 assert CARDS_PER_DEAL % 2 == 1 MAX_DEAL = prod(x for x in range(len(DECK) - CARDS_PER_DEAL + 1, len(DECK) + 1)) DEAL_BITS = MAX_DEAL.bit_length() def text_from_cards(string): return string.translate(string.maketrans(DECK, ALPHABET52)) def deal_game(): shuffle = getrandbits(DEAL_BITS) % MAX_DEAL deck = list(DECK) deal = "" while shuffle > 0: deal += deck.pop(shuffle % len(deck)) shuffle //= len(deck) + 1 while len(deal) < CARDS_PER_DEAL: deal += deck.pop(0) return deal def print_puzzle(): with open("cards.txt", "w") as cards_file: for i in range(750): table = deal_game() cards_file.write(f"Game {i+1}:\n") for i in range((CARDS_PER_DEAL - 5) // 2): cards_file.write(f"{i + 1}: {table[i * 2]}{table[i * 2 + 1]} ") cards_file.write("\nTable: {}{}{} {} {}\n\n".format(*table[CARDS_PER_DEAL - 5:]))
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2022/crypto/hash/chal.py
ctfs/ImaginaryCTF/2022/crypto/hash/chal.py
#!/usr/bin/env python3 import string import random config = [[int(a) for a in n.strip()] for n in open("jbox.txt").readlines()] # sbox pbox jack in the box # secure hashing algorithm 42 def sha42(s: bytes, rounds=42): out = [0]*21 for round in range(rounds): for c in range(len(s)): if config[((c//21)+round)%len(config)][c%21] == 1: out[(c+round)%21] ^= s[c] return bytes(out).hex() def main(): print("Can you guess my passwords?") for trial in range(50): print(f"--------ROUND {trial}--------") password = "".join([random.choice(string.printable) for _ in range(random.randint(15,20))]).encode() hash = sha42(password) print(f"sha42(password) = {hash}") guess = bytes.fromhex(input("hex(password) = ").strip()) if sha42(guess) == hash: print("Correct!") else: print("Incorrect. Try again next time.") exit(-1) flag = open("flag.txt", "r").read() print(f"Congrats! Your flag is: {flag}") if __name__ == "__main__": main()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2022/crypto/SecureEncodingHex/encode.py
ctfs/ImaginaryCTF/2022/crypto/SecureEncodingHex/encode.py
#!/usr/bin/env python3 from random import shuffle charset = '0123456789abcdef' shuffled = [i for i in charset] shuffle(shuffled) d = {charset[i]:v for(i,v)in enumerate(shuffled)} pt = open("flag.txt").read() assert all(ord(i)<128 for i in pt) ct = ''.join(d[i] for i in pt.encode().hex()) f = open('out.txt', 'w') f.write(ct)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2022/crypto/LivingWithoutExpectations/lwe.py
ctfs/ImaginaryCTF/2022/crypto/LivingWithoutExpectations/lwe.py
import numpy as np import secrets def rand(seed): seeds = [(seed >> (3 * i)) & 7 for i in range(nseeds)] a = 5 b = 7 while True: for i in range(nseeds): seeds[i] = (a * seeds[i] + b) & 7 yield seeds[i] q = 2**142 + 217 n = 69 nseeds = 142 rng = rand(secrets.randbits(3 * nseeds)) with open("flag.txt", "rb") as f: flag = f.read().strip() bits = f'{int.from_bytes(flag, "big"):0{len(flag) * 8}b}' s = np.array([secrets.randbits(1) for _ in range(n)]) for bit in map(int, bits): A = np.array([secrets.randbelow(q) for _ in range(n * n)]).reshape((n, n)) b = [A @ s + np.array([next(rng) for _ in range(n)]), np.array([secrets.randbelow(q) for _ in range(n)])][bit] print(list(map(hex, A.reshape(-1))), list(map(hex, b % q)))
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2022/crypto/smoll/smoll.py
ctfs/ImaginaryCTF/2022/crypto/smoll/smoll.py
from secret import p, q from sage.all import factor for r in [p, q]: for s, _ in factor(r - 1): assert int(s).bit_length() <= 20 n = p * q e = 0x10001 with open("flag.txt", "rb") as f: flag = int.from_bytes(f.read().strip(), "big") assert flag < n ct = pow(flag, e, n) print(f"{n = }") print(f"{e = }") print(f"{ct = }")
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2022/crypto/cbc/cbc.py
ctfs/ImaginaryCTF/2022/crypto/cbc/cbc.py
from Crypto.Cipher import AES from Crypto.Util.Padding import pad, unpad from os import urandom def cbc_encrypt(msg: bytes): msg = pad(msg, 16) msg = [msg[i:i+16] for i in range(0, len(msg), 16)] key = urandom(16) out = [] for block in msg: cipher = AES.new(key, AES.MODE_ECB) next = cipher.encrypt(block) out.append(next) key = next out = b"".join(out) return key, out def main(): key, ct = cbc_encrypt(open("flag.txt", "rb").read()*3) print(f"{ct = }") if __name__ == "__main__": main() # ct = b"\xa2\xb8 <\xf2\x85\xa3-\xd1\x1aM}\xa9\xfd4\xfag<p\x0e\xb7|\xeb\x05\xcbc\xc3\x1e\xc3\xefT\x80\xd3\xa4 ~$\xceXb\x9a\x04\xf0\xc6\xb6\xd6\x1c\x95\xd1(O\xcfx\xf2z_\xc3\x87\xa6\xe9\x00\x1d\x9f\xa7\x0bm\xca\xea\x1e\x95T[Q\x80\x07we\x96)t\xdd\xa9A 7dZ\x9d\xfc\xdbA\x14\xda9\xf3\xeag\xe3\x1a\xc8\xad\x1cnL\x91\xf6\x83'\xaa\xaf\xf3i\xc0t=\xcd\x02K\x81\xb6\xfa.@\xde\xf5\xaf\xa3\xf1\xe3\xb4?\xf9,\xb2:i\x13x\xea1\xa0\xc1\xb9\x84"
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2022/crypto/otp/otp.py
ctfs/ImaginaryCTF/2022/crypto/otp/otp.py
#!/usr/bin/env python3 from Crypto.Util.number import long_to_bytes, bytes_to_long import random import math def secureRand(bits, seed): jumbler = [] jumbler.extend([2**n for n in range(300)]) jumbler.extend([3**n for n in range(300)]) jumbler.extend([4**n for n in range(300)]) jumbler.extend([5**n for n in range(300)]) jumbler.extend([6**n for n in range(300)]) jumbler.extend([7**n for n in range(300)]) jumbler.extend([8**n for n in range(300)]) jumbler.extend([9**n for n in range(300)]) out = "" state = seed % len(jumbler) for _ in range(bits): if int(str(jumbler[state])[0]) < 5: out += "1" else: out += "0" state = int("".join([str(jumbler[random.randint(0, len(jumbler)-1)])[0] for n in range(len(str(len(jumbler)))-1)])) return long_to_bytes(int(out, 2)).rjust(bits//8, b'\0') def xor(var, key): return bytes(a ^ b for a, b in zip(var, key)) def main(): print("Welcome to my one time pad as a service!") flag = open("flag.txt", "rb").read() seed = random.randint(0, 100000000) while True: inp = input("Enter plaintext: ").encode() if inp == b"FLAG": print("Encrypted flag:", xor(flag, secureRand(len(flag)*8, seed)).hex()) else: print("Encrypted message:", xor(inp, secureRand(len(inp)*8, seed)).hex()) if __name__ == "__main__": main()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2022/crypto/Lorge/lorge.py
ctfs/ImaginaryCTF/2022/crypto/Lorge/lorge.py
from secret import p, q from sage.all import factor for r in [p, q]: for s, _ in factor(r - 1): assert int(s).bit_length() <= 25 n = p * q e = 0x10001 with open("flag.txt", "rb") as f: flag = int.from_bytes(f.read().strip(), "big") assert flag < n ct = pow(flag, e, n) print(f"{n = }") print(f"{e = }") print(f"{ct = }")
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2022/web/maas/app.py
ctfs/ImaginaryCTF/2022/web/maas/app.py
from flask import Flask, render_template, request, make_response, redirect from hashlib import sha256 import time import uuid import random app = Flask(__name__) memes = [l.strip() for l in open("memes.txt").readlines()] users = {} taken = [] def adduser(username): if username in taken: return "username taken", "username taken" password = "".join([random.choice("abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789") for _ in range(30)]) cookie = sha256(password.encode()).hexdigest() users[cookie] = {"username": username, "id": str(uuid.uuid1())} taken.append(username) return cookie, password @app.route('/') def index(): return redirect("/login") @app.route('/users') def listusers(): return render_template('users.html', users=users) @app.route('/users/<id>') def getuser(id): for k in users.keys(): if users[k]["id"] == id: return f"Under construction.<br><br>User {users[k]['username']} is a very cool user!" @app.route('/login', methods=['GET', 'POST']) def login(): if request.method == "POST": resp = make_response(redirect('/home')) cookie = sha256(request.form["password"].encode()).hexdigest() resp.set_cookie('auth', cookie) return resp else: return render_template('login.html') @app.route('/register', methods=['GET', 'POST']) def register(): if request.method == "POST": cookie, password = adduser(request.form["username"]) resp = make_response(f"Username: {request.form['username']}<br>Password: {password}") resp.set_cookie('auth', cookie) return f"Username: {request.form['username']}<br>Password: {password}" else: return render_template('register.html') @app.route('/home', methods=['GET']) def home(): cookie = request.cookies.get('auth') username = users[cookie]["username"] if username == 'admin': flag = open('flag.txt').read() return render_template('home.html', username=username, message=f'Your flag: {flag}', meme=random.choice(memes)) else: return render_template('home.html', username=username, message='Only the admin user can view the flag.', meme=random.choice(memes)) @app.errorhandler(Exception) def handle_error(e): return redirect('/login') def initialize(): random.seed(round(time.time(), 2)) adduser("admin") initialize() app.run('0.0.0.0', 8080)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false